Chat with us, powered by LiveChat Data Security Archives | Proven Data

Data Security

Proven Data Ransomware compliance

Our History of Ransomware & Compliance

Proven Data has been and will continue to be a pioneer in the ransomware remediation and recurrence prevention. Ransomware is a type of malware that locks up files and demands payment usually in the form of bitcoin. The files are not unlocked until a key is obtained from the threat actor after making payment.

Ransomware continues to be a major threat affecting organizations and their networks of all sizes, and Proven Data stands by our clients with the intent […]

Phishing Report: Cyber Extortion On the Rise

There is a new type of phishing email circulating and bypassing email security solutions. The email attempts to obtain payment from victims who believed they have been watched while performing explicit activities.

In the past week, Proven Data received the following email:

The cybercriminal instills the fear that he has been watching the victim’s activity. Specifically, the attacker makes it look like the victim was being recorded while watching explicit videos. This email can make people feel intimidated if they […]

Phishing Report: False Amazon Email Confirmation

Be wary of these new, high-quality phishing attempts making its way to email inboxes

Phishing is a method of Business Email Compromise (B.E.C.) in which bad actors attempt to steal authentication credentials like usernames and passwords. Cybercriminals then access business accounts and can cause plenty of issues once they have control. If those phishing emails bypass our Email Filtering System, our users are trained to detect sophisticated phishing emails due to our rigid Cyber Security Awareness program.

Recently, Proven Data […]

phishing emails

Phishing Emails: Origins, Damage, and Protection

In recent years, there has been a tremendous increase in cyber attacks originating from phishing emails. Attackers are becoming more sophisticated in the crafting mechanisms to deploy malware on systems. This article will analyze the different ways that we have seen malware attack a system as well as it’s origins and how we can stay protected.
Based on our research, most of the IP addresses that we are seeing originate from Eastern Europe. Cybercriminals utilize various methods of malicious code […]

Securing Your Home or Business Router

During the month of October, Proven Data will be celebrating National Cyber Security Awareness Month alongside StaySafeOnline.org and the 2018 NCSAM Official Champions! Our goal is to provide the community with more resources and information regarding some basic topics on how to stay safe and protect your data.
Proven Data has been featured in BestCompany’s Internet Security Essentials: Hardware, Passwords, and Encryption! 
What is a router?
A router is a network hardware communication tool that connects all of the devices in a […]

2018 National Cyber Security Awareness Month

Proven Data Supports National Cybersecurity Awareness Month 2018 as a Champion
(This press release was drafted by the National Cyber Alliance for the NCSAM 2018 campaign Champions) [1]
Proven Data today announced that it has become a Champion of National Cybersecurity Awareness Month (NCSAM) 2018. It will be joining a growing global effort among businesses, government agencies, colleges and universities, associations, nonprofit organizations and individuals to promote the awareness of online safety and privacy.   
A multi-layered and far-reaching campaign held annually […]

General Data Protection Regulation

Proven Data’s Commitment to Client Privacy

At Proven Data we take our privacy policy seriously. We want our clients to know we value their privacy and take great measure to ensure their data is protected while in our hands. As a cyber security & data recovery company with global experience, we are used to meeting the needs of a wide variety of regulations. The bottom line is, we take no shortcuts, and believe in maintaining the safety and privacy of any data as a top […]

HIPAA Data Breach & Security

Creating a Security-Minded Culture in Your Medical Practice

A HIPAA Data Breach Infographic Worth a Thousand Words

Click on the HIPAA data breach infographic to view a larger image.
Despite the emphasis and priority of patient information security, medical organization staff situations change, leaving gaps for potential information breaches for those that are not trained. Professional data recovery companies are also aware that new employees in the critical IT departments may not be informed and educated on the specifics of their systems or disaster recovery procedures.
The 2003 HIPAA Privacy Rule was […]

Cryptowall 4.0: It’s Back and Worse than Before

It has not even been a year since Cryptowall 3.0 was discovered and now there is a new version, Cryptowall 4.0 and it is more devious and demented than its former version.  Released and targeted worldwide, Cryptowall 4.0 has many elements of before but now has improved communication capabilities and has included a more resilient cloaking segment so that it is a lot more challenging to protect against. Cryptowall data recovery has never been more complicated.
It is bad enough […]

Android Adult Player Ransomware: Secretly Taking Pictures

There is a recently discovered ransomware called “Adult Player” that is making its rounds for Android users. The devilish software acts like a porn app, however, when you download it to your phone it begins taking pictures of you, blocks your device and then demands a ransom amount of $500.  Downloading random APK files is a major warning, however, for those that are naïve and believe they are accessing a free Android porn app, they are in for a […]