30 Ransomware Prevention Tips

Dealing with the aftermath of ransomware attacks is like Russian roulette. Submitting the ransom might seem like it’s the sole option for recovering locked data. But paying the ransom doesn’t mean that your organization will get its affected data back…. Continue reading 30 Ransomware Prevention Tips

Challenges and drivers influencing container infrastructure backup and recovery

As containers continue to rise in popularity, organizations need to understand that they are uniquely designed and consequently require a specialized data protection strategy. However, a Zerto survey reveals a major disconnect in data protection strate… Continue reading Challenges and drivers influencing container infrastructure backup and recovery

Google Backup and Sync: Is It Really Backup?

The Google Backup and Sync app (for personal use and Drive File Stream for businesses) is the replacement for Google Drive and Photos desktop apps for Windows PCs and Macs. Learn how to use it and if it’s really a viable “backup” option.
The post Googl… Continue reading Google Backup and Sync: Is It Really Backup?

Can’t Amazon see my files if I use s3cmd/gpg with a complex password?

Since the early days of s3cmd I use it in combination with random generated filenames (uuidgen loop) and a complex passphrase (pwgen -n1 -c 32 -y). On security.stackexchange.com search there is only 1 result for s3cmd.
I use Amazon S3 (Gla… Continue reading Can’t Amazon see my files if I use s3cmd/gpg with a complex password?

Attacked by ransomware? Five steps to recovery

Ransomware has been noted by many as the most threatening cybersecurity risk for organizations, and it’s easy to see why: in 2019, more than 50 percent of all businesses were hit by a ransomware attack – costing an estimated $11.5 billion. In the last … Continue reading Attacked by ransomware? Five steps to recovery