It’s probably the last thing you’re thinking of as you prepare for the worst during a Hurricane: protecting your data! With Hurricane season upon us, and Hurricane Florence heading towards the East Coast, think to yourself: when is the last time I backed-up my files on my computer to make sure they are safe? In a survey conducted by BackBlaze  it was concluded that 24% of computer owners have never backed-up their files and data! This is discerning because […]
Worldwide WannaCry Ransomware: Largest Cyberattack in History
Over 75,000 instances of the “.WCRY” file extension detected by Avast, and 45,000 instances reported by Kaspersky Lab Friday as businesses are reeling from what is believed to be the largest cyber-attack in history. The attack has been dubbed “WannaCry” Ransomware, but can also be referred to as WanaCryptor, WannaCrypt, or Wana Decrypt0r.
Hackers known as The Shadow Brokers, stole exploit tools from the NSA (National Security Agency) and leaked them in April. EternalBlue […]
Multiple sclerosis (MS) is an unpredictable, often disabling disease of the central nervous system that disrupts the flow of information within the brain, and between the brain and body. Symptoms range from blurred vision, loss of balance, poor coordination, slurred speech, tremors, numbness, extreme fatigue, problems with memory and concentration, paralysis, blindness and more. MS is different for everyone, and that makes it all the more challenging to solve.
Believe it or not, pedaling a bike could be the […]
I’d like to start off by thanking everyone who participated in the technology scholarship contest late last year. The goal of the scholarship is to inspire those that are committed to the growth and movement of technology and to take on the journey that will continue to be an integrated part of humanity’s social structure and assist in the protection and security of a global community.
After going through countless applications, the time has come to pick the winner. The […]
A HIPAA Data Breach Infographic Worth a Thousand Words
Click on the HIPAA data breach infographic to view a larger image.
Despite the emphasis and priority of patient information security, medical organization staff situations change, leaving gaps for potential information breaches for those that are not trained. Professional data recovery companies are also aware that new employees in the critical IT departments may not be informed and educated on the specifics of their systems or disaster recovery procedures.
The 2003 HIPAA Privacy Rule was […]
It has not even been a year since Cryptowall 3.0 was discovered and now there is a new version, Cryptowall 4.0 and it is more devious and demented than its former version. Released and targeted worldwide, Cryptowall 4.0 has many elements of before but now has improved communication capabilities and has included a more resilient cloaking segment so that it is a lot more challenging to protect against. Cryptowall data recovery has never been more complicated.
It is bad enough […]
It is understood that the success of every company revolves around the technologies that they employ, and this technology is embedded in the security of the IT infrastructure. The importance of a top level disaster recovery plan is therefore paramount to survival. When a technology catastrophe hits, it can be due to many circumstances, including cyber attack as well as system failures. The conundrum occurs when a company chooses to make use of in-house staff to repair or fix […]
There is an odd ‘hot button’ that is touched within the brain when the word ‘backup’ is conveyed. It is a kind of mid-point between the logical and the emotional, conveying a dichotomy in the blend of guilt, understanding, and denial. This fusion transcends beyond intellect and enters the psychological realm that remains a mystery, as even those that are the most knowledgeable often fail at accomplishing the backups that are needed to preserve their data. This stand has […]
There is a recently discovered ransomware called “Adult Player” that is making its rounds for Android users. The devilish software acts like a porn app, however, when you download it to your phone it begins taking pictures of you, blocks your device and then demands a ransom amount of $500. Downloading random APK files is a major warning, however, for those that are naïve and believe they are accessing a free Android porn app, they are in for a […]