Chat with us, powered by LiveChat Victor Congionti | 2/4 | Proven Data

Author - Victor Congionti

Fake Windows 10 Updates Spawning Ransomware

With the launch of Windows 10 come the usual love-hate anticipation of new features, combined with the usual bugs and fixes. The release has been scheduled for quite some time, and this has given the dark side of the cyber world a sufficient alert to create a CBT-locker brand ransomware to take advantage of the innocent and unaware. The announcement of a ‘free upgrade’ by Microsoft has led to new operating installations in over 190 countries and following close-on-the-heels […]

Proven Data Recovery and Carbonite Partnership: Elevating Client Data Security

As cybercriminals continue to escalate their efforts to breach our computers and network, it takes an equal amount of defense in the protection of critical data. It is no longer enough to have simply a firewall or attentive IT staff, the war against cyber hackers now requires extensive protection. To address this escalation in defense, Proven Data Recovery and Carbonite have created a partnership that blends consumer and business backups and consultations to the next level. The combined expertise […]

Even Google Is Vulnerable to Data Loss

As much as we power human intellect and ingenuity, it appears that Mother Nature can outsmart even the best of us. An example of this occurred during a storm in Belgium when there were four lightning strikes on the power grid that supports one of the data centers for Google, causing data loss for some customers. The good news is that through a variety of backup technologies, customers were able to recover a percentage of the lost data. This […]

DDRescue: Free Tool for Data Recovery

While there are quite a few free or shareware programs designed to assist in data recovery, ddrescue has been a well-founded and preferred tool with a number of years of tried and true use. Not to be confused with dd_rescue, which is a totally different software and not related, ddrescue is allows the user to copy data from one file or block device (cdrom, hard disk, etc.) to another.
The benefits of ddrescue is that it does allow the user […]

Who Makes the Most Reliable Enterprise Hard Drives?

In this article we’ll dive into who makes the most reliable enterprise hard drives. Hard drives are the heart blood of the computer and as such, reliability is the critical key. As the ‘engine’ of our technologies, manufacturers are constantly reassuring that theirs is the best. In the business world, enterprise hard drives are not just the mainstay of the business, they often are the business. Failure of any sort involvesenterprise hard drive recovery and, depending upon the downtime, can […]

Free Disk Imaging Software; 10 Tools You Can Image Your Hard Drive For Free

Imaging a hard drive can be considered a crucial step for data security as well as preventing the need for data recovery. The purpose of imaging is designed to be used as a backup system, in case of loss or infection from a virus or malicious malware.
Hard drive imaging is the process of taking a healthy computer hard drive and copying the image file to a separate and secure location, as is. One would then establish a standard backup […]

ransomware data recovery

Free Guide To Ransomware: Proactive Protection, Mitigation, & Safety

The DoJ announced that the Internet Crime Complaint Center (IC3) had received roughly 7,750 public complaints regarding ransomware since 2005, with an estimated $57.6 million in damages. The costs come from ransoms paid in addition to the associated cost of lost data.
Cyber threats are continuing to escalate through the use of Ransomware virus invasions. The sophistication of the programs take viruses to a new level as entire computers and networks have their critical files encrypted and then held ‘ransom’ […]

Google Chrome: Are Others Listening to Your Conversations?

While many have come to associate Google with a level of trust, open source developers will tell you that is far from the truth. It seems that they discovered that the Chromium browser, the main Google Chrome open source, has a hidden snooping code that has the capability of listening to users in front of their computers. While Google insists that they have removed the ‘opt-in’ software, there are those involved in the dark side of the cyber world […]

5 Ways New EMV Chips on Credit Cards Will Impact Consumers

Credit card identity theft has been on the increase over the last number of years; and it seems that as quickly as credit card companies try to adjust for security, the hackers figure out a way to overcome the protocols set in place. However, this is all about to change with the implementation of the new ‘chip credit cards’, placing a broad spectrum layer of security for credit cards. While over 120 million Americans have already received their new […]

Computer Forensic Services

Introduction to Ransomware and Why You Should Be Concerned

The mere term of ‘cybercrime’ sends chills down the spines of every IT Department member.  It is the topic of discussion in closed door meetings, where only the strong dare attend, which include conversations of system reinforcement and watchful diligence. Cyber hacking has taken a different twist in the last few years with the introduction of a particularly nasty form called ‘ransomware’. These cyber criminals don’t try to hide the fact that they have attacked your system, instead they […]