News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Immutable memory protects against attacks
Immutable memory protects against attacks

A survey of cybersecurity experts from companies with more than 1.000 employees confirms that 46 percent of respondents believe that generative AI increases their company's vulnerability to attacks. This trend appears to be already well underway, with 75 percent of respondents confirming that they are seeing an increase in attacks compared to last year - 85 percent attributing this increase to the use of generative AI by cybercriminals. With generative AI, cyber fraudsters have even more options to adapt flexibly, use complex tactics to circumvent traditional data protection solutions and...

Read more

Ransomware attack on IT service providers
B2B Cyber ​​Security ShortNews

A data center owned by the Finnish IT service provider Tietoevry located in Sweden was recently attacked with ransomware. Numerous companies, authorities and universities are affected by this. A lot of data cannot be restored. The Finnish IT service provider Tietoevry is one of the largest IT service providers in Europe. The attackers used the ransomware to encrypt not only the data of numerous Tietoevry customers in Sweden, but also the backups and log files. Therefore, Tietoevry apparently cannot restore the affected data of numerous customers. A press release from Tietoevry said: “While the overall recovery has progressed, services for those affected…

Read more

Recover deleted SaaS data
Recover deleted SaaS data

According to Statista, Microsoft Office 365 controls nearly 50 percent of the global office productivity software market. Surely one or two users of this suite have accidentally permanently deleted an email, but Office 365 has built-in data protection functions that can be used to restore Outlook emails. This includes various email retention policy features that can be individually configured to meet specific legal compliance and operational requirements. In principle, however, the following applies: Exchange Online stores deleted emails for 14 days, up to a maximum of 30 days. Data protection at the highest level Difficult or even...

Read more

Appropriate data security in industry
Appropriate data security in industry

Data security and backups for businesses are easy to ensure in theory, but how does it work in reality? The current case study shows how easily a company can decide on a solution and how particularly easy it is to implement a cloud-supported solution. A case study by Rubrik. Kelvion, a global manufacturer of industrial heat exchangers, has a complex IT infrastructure. This extends across numerous locations and a global sales and production network. Founded in Bochum in 1920, the group grew steadily over the years. The more global it became, the more challenging it became...

Read more

The unhackable data vault
The Unhackable Data Vault - Image by Gerd Altmann on Pixabay

Well-known and reliable: tape libraries are still one of the safest solutions for protecting and restoring data. Ransomware in particular cannot access this data because it cannot be physically accessed: an unhackable data vault. “Tape libraries have been experiencing a renaissance for some time now. Once relegated to obsolescence, tape now offers very high and, above all, cost-effective capacity for cold or archival data. What is less known is that tape is also one of the most secure storage solutions for backing up and restoring data. Because tape basically has the advantage over other storage media, such as...

Read more

Data security & backup – more than a parachute for companies
Backup as a parachute for companies

Companies need a solution for backup, disaster recovery, archiving and also for their cold data. Six questions, six answers from Hannes Heckel, Head of Marketing at FAST LTA, about solutions and how managed storage can help, especially in terms of capacity, performance, function and long-term costs. B2B-CS: Mr. Heckel, do you have anything against tape when it comes to backup and recovery? Hannes Heckel, FAST LTA: No, in principle not at all, because the sensitive issue must be considered on a case-by-case basis. With tape it's like this: Many of our customers still rely on tape simply because...

Read more

Data recovery against ransomware
Data recovery against ransomware

Ransomware, which targets individuals, businesses and governments alike, has become one of the biggest threats to IT security. When hackers encrypt valuable data and demand hefty ransoms, it cripples operations and causes severe financial losses and enormous reputational damage. There are attacks that have made big headlines in the past, but the ransomware threat has become an unfortunate reality for virtually every business. According to the 2023 Veeam Data Protection Trends Report, 85 percent of organizations were affected by at least one ransomware attack last year, and just under…

Read more

Microsoft Azure DevOps: New backup and recovery service 
B2B Cyber ​​Security ShortNews

Keepit already protects cloud data in software-as-a-service (SaaS) services with a blockchain-verified solution. The Azure DevOps service now complements the coverage of Microsoft's cloud services such as Office 365. DevOps is the umbrella term for practices that combine software development (Dev) and IT operations (Ops). They feature fast and continuous delivery, workflow automation, and fast feedback. The aim of the processes is to increase effectiveness and efficiency in software development in order to deliver products quickly and with high quality. Azure DevOps: New backup and recovery service Azure DevOps (ADO) is Microsoft's solution for implementing DevOps...

Read more

Cyber ​​resilience: How fatal are mistakes
Cyber ​​resilience: how fatal errors can be - Image by Gerd Altmann from Pixabay

The consequences of a cyber attack can be devastating. They range from financial loss to reputational damage to legal repercussions. And the risk increases. Three mistakes usually lead to high risk and damage from cyberattacks Recent studies confirm that ransomware attackers manage to encrypt the data in 71 percent of attacks and that paying a ransom doubles the overall recovery costs. In addition, data is stolen in 30 percent of ransomware attacks in Germany. Build strong cyber resilience The good news: Organizations can protect themselves against…

Read more

Android Spyware: GravityRAT steals WhatsApp backups
B2B Cyber ​​Security ShortNews

WhatsApp users should pay close attention to what they download on their Android smartphones. ESET researchers have detected a new Android version of GravityRAT spyware hiding in infected versions of BingeChat and Chatico messaging apps. Since SMEs in particular also like to use private smartphones including WhatsApp, caution is called for. In the case under investigation, the malicious app steals WhatsApp backups and can also delete files on the devices. In order not to be immediately noticed, the app offers legitimate chat functionality based on the open-source application OMEMO Instant Messenger. ESET suspects the group SpaceCobra behind this campaign,…

Read more