The dangers of dual ransomware attacks

At some point in the movie “Groundhog Day,” Phil Connors breaks his bedside radio when he is woken up (yet again) by the song “I Got You Babe”. This déjà vu seems to await companies that fall victim to ransomware and fail to orchestrate the proper resp… Continue reading The dangers of dual ransomware attacks

How to Permanently Save Voicemails in iOS and Android

Some voicemails need to be saved for legal, business, personal or other reasons. Find out how to do so on iOS and Android devices to safeguard these messages. Continue reading How to Permanently Save Voicemails in iOS and Android

Fix 0x80042304: The volume shadow copy provider is not registered in the system

In this article, we will see how to fix the “0x80042304: The volume shadow copy provider is not registered in the system” error on Windows 11/10. This error is associated with the Volume Shadow Copy Service on a Windows PC. You can configur… Continue reading Fix 0x80042304: The volume shadow copy provider is not registered in the system

Best practices for implementing a proper backup strategy

Implementing a robust backup strategy for safeguarding crucial business data is more essential than ever. Without such a plan, organizations risk paying ransoms and incurring expenses related to investigations and lost productivity. In this Help Net Se… Continue reading Best practices for implementing a proper backup strategy

Outdoor backup: gocryptfs –init –reverse: alway same .diriv in 1st level directory

Intro
Trying to send encrypted backup of in productions filesystems, I was interested by the ability of using gocryptfs in reverse mode!
The idea is to

use gocryptfs –reverse from any existing (unencrypted) folder, for mounting an encryp… Continue reading Outdoor backup: gocryptfs –init –reverse: alway same .diriv in 1st level directory

Ransomware attacks go beyond just data

65% of organizations confirmed that ransomware is one of the top three threats to their viability, and for 13%, it is the biggest threat, according to a report by Enterprise Strategy Group (ESG) and Keepit. Organizations’ strategies against ranso… Continue reading Ransomware attacks go beyond just data