Blog

Wana Crypt Outbreak Map

The Largest Cyber Attack Worldwide In History; WannaCry Ransomware

Worldwide WannaCry Ransomware: Largest Cyberattack in History
Over 75,000 instances of the “.WCRY” file extension detected by Avast, and 45,000 instances reported by Kaspersky Lab Friday as businesses are reeling from what is believed to be the largest cyber-attack in history. The attack has been dubbed “WannaCry” Ransomware, but can also be referred to as WanaCryptor, WannaCrypt, or Wana Decrypt0r.
Hackers known as The Shadow Brokers, stole exploit tools from the NSA (National Security Agency) and leaked them in April. EternalBlue […]

Bike for MS nyc 2016

Bike For MS New York City 2016

Hello All,
Multiple sclerosis (MS) is an unpredictable, often disabling disease of the central nervous system that disrupts the flow of information within the brain, and between the brain and body. Symptoms range from blurred vision, loss of balance, poor coordination, slurred speech, tremors, numbness, extreme fatigue, problems with memory and concentration, paralysis, blindness and more. MS is different for everyone, and that makes it all the more challenging to solve.
Believe it or not, pedaling a bike could be the […]

Proven Data Recovery Scholarships

Technology Scholarship Essay Winner Selected!

I’d like to start off by thanking everyone who participated in the technology scholarship contest late last year. The goal of the scholarship is to inspire those that are committed to the growth and movement of technology and to take on the journey that will continue to be an integrated part of humanity’s social structure and assist in the protection and security of a global community.
After going through countless applications, the time has come to pick the winner. The […]

HIPAA Data Breach & Security

Creating a Security-Minded Culture in Your Medical Practice

A HIPAA Data Breach Infographic Worth a Thousand Words

Click on the HIPAA data breach infographic to view a larger image.
Despite the emphasis and priority of patient information security, medical organization staff situations change, leaving gaps for potential information breaches for those that are not trained. Professional data recovery companies are also aware that new employees in the critical IT departments may not be informed and educated on the specifics of their systems or disaster recovery procedures.
The 2003 HIPAA Privacy Rule was […]

Cryptowall 4.0: It’s Back and Worse than Before

It has not even been a year since Cryptowall 3.0 was discovered and now there is a new version, Cryptowall 4.0 and it is more devious and demented than its former version.  Released and targeted worldwide, Cryptowall 4.0 has many elements of before but now has improved communication capabilities and has included a more resilient cloaking segment so that it is a lot more challenging to protect against. Cryptowall data recovery has never been more complicated.
It is bad enough […]

The Ultimate Price for Attempting In-House Data Recovery

It is understood that the success of every company revolves around the technologies that they employ, and this technology is embedded in the security of the IT infrastructure. The importance of a top level disaster recovery plan is therefore paramount to survival. When a technology catastrophe hits, it can be due to many circumstances, including cyber attack as well as system failures. The conundrum occurs when a company chooses to make use of in-house staff to repair or fix […]

Why Do We Avoid Backups?

There is an odd ‘hot button’ that is touched within the brain when the word ‘backup’ is conveyed. It is a kind of mid-point between the logical and the emotional, conveying a dichotomy in the blend of guilt, understanding, and denial. This fusion transcends beyond intellect and enters the psychological realm that remains a mystery, as even those that are the most knowledgeable often fail at accomplishing the backups that are needed to preserve their data. This stand has […]

Android Adult Player Ransomware: Secretly Taking Pictures

There is a recently discovered ransomware called “Adult Player” that is making its rounds for Android users. The devilish software acts like a porn app, however, when you download it to your phone it begins taking pictures of you, blocks your device and then demands a ransom amount of $500.  Downloading random APK files is a major warning, however, for those that are naïve and believe they are accessing a free Android porn app, they are in for a […]

Fake Windows 10 Updates Spawning Ransomware

With the launch of Windows 10 come the usual love-hate anticipation of new features, combined with the usual bugs and fixes. The release has been scheduled for quite some time, and this has given the dark side of the cyber world a sufficient alert to create a CBT-locker brand ransomware to take advantage of the innocent and unaware. The announcement of a ‘free upgrade’ by Microsoft has led to new operating installations in over 190 countries and following close-on-the-heels […]

Proven Data Recovery and Carbonite Partnership: Elevating Client Data Security

As cybercriminals continue to escalate their efforts to breach our computers and network, it takes an equal amount of defense in the protection of critical data. It is no longer enough to have simply a firewall or attentive IT staff, the war against cyber hackers now requires extensive protection. To address this escalation in defense, Proven Data Recovery and Carbonite have created a partnership that blends consumer and business backups and consultations to the next level. The combined expertise […]