Air Gapped Backups: What is it and how does DRworx solution fit the criteria?
What is Air Gapping? Air gapped backups are part of a cyber-defense strategy in which a network’s backups are not accessible by LAN or WIFI, keeping them isolated from the network. In order to retrieve air gapped backups, an individual [...]
Critical: Microsoft Discovers 17-Year-Old Vulnerability
Major news has been revealed this week that Check Point, an Israeli Security Firm, discovered a vulnerability in Microsoft's domain name system protocol (DNS). Most alarming is that the bug has existed for roughly 17 years. It is advised that [...]
Three Issues in the Cyberspace Solarium Commission Report
The March Cyberspace Solarium Commission report advised that businesses and the U.S government should incorporate layered cybersecurity into their defense strategy. Additionally, the report insists that Congress, “pass a law establishing that final goods assemblers of software, hardware and [...]
Is Cyber Insurance Unintentionally Increasing Ransomware Attacks?
Each year the total ransomware cases and money demanded, either through bitcoin or other monetary means, increases. Attacks can cost businesses and governments millions of dollars in recovery fees, and the enormous payout is why the ransomware industry is so [...]
Cybercrime: Non-Personal and Potentially Deadly
Written by Oli Thordarson, President/CEO of Alvaka Networks Mimi Grant, President of ABL Organization, wrote to me asking if a recent Red Cross plea to cyber-criminals to not attack hospitals with ransomware and extortion will help reduce cybercrime activity. [...]
Essential Steps for Ransomware Recovery
Are you a victim of ransomware? Or have you been one in the past? If so, the following will help you understand what activities you should expect during the course of your ransomware recovery in the days following an attack. [...]






