News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

SME: Backup and recovery including malware detection 
SME: Backup and recovery including malware detection MS - AI

More resilience against ransomware for SMBs: The latest version of the all-in-one data protection solution Veritas Backup Exec offers new malware detection, role-based access control and faster backup and recovery. Secure multi-cloud data management: Veritas has announced further developments for Veritas Backup Exec. More than 45.000 small and medium-sized companies (SMEs) worldwide rely on the uniform backup and recovery solution. The latest updates include malware detection capabilities, role-based access control, and other optimizations for quickly backing up and restoring business-critical data. Ransomware: More protection and data security With the increase in ransomware attacks, concerns about data security are growing in all companies. A study…

Read more

Why cybercriminals specifically target backups
Why cybercriminals specifically target backups AI - MS

There are two main ways to recover encrypted data after a ransomware attack: restoring from backups and paying the ransom. The attackers also know this and try to deprive companies of a solution by attacking backups. Two problems, same cause: Complete recovery of data after a ransom payment is highly uncertain, because in case of doubt you cannot rely on a promise from cybercriminals. And restoring the data from the backups doesn't work in many cases because the cybercriminals have often encrypted them in order to...

Read more

Tape storage as a valuable backup and cyber protection strategy
Tape storage as a valuable backup and cyber protection strategy AI - MS

When it comes to their backup recovery solution, many companies primarily focus on storage technologies that ensure high speed data recovery to maintain business continuity. That's why hard drives (including SSD) and the cloud play an important role. But the constant threat of a ransomware attack and technological developments also make tape essential. In the event of any kind of data loss - be it due to a technical failure, human error or an attack by cyber criminals - it is the backup recovery system that helps companies out of the unfortunate situation. To always have this lifeline...

Read more

Cyber ​​security insurance or better data protection?
Cyber ​​security insurance or better data protection? - Image by Steve Buissinne on Pixabay

The volume of data in organizations is constantly growing and many companies are grappling with the question of how to protect this amount of data from ransomware attacks or data breaches. Cybersecurity insurance only helps repair the financial damage. Cyber ​​security solutions provide critical protection for networks, systems and data. In order to protect themselves beyond successful cyber defense, more and more companies are taking out cybersecurity insurance so that they can compensate for financial losses in the worst-case scenario. However, many companies lack knowledge about how cyber insurance works, when it makes sense and what the total costs are...

Read more

The right strategy after a data loss
The right strategy after a data loss KI-MS

Companies around the world face numerous threats. International studies also show this. A study by Arcserve shows that 76 percent of companies have suffered a serious data loss. In this context, 83 percent described downtime of 12 hours or less as acceptable. 10 tips for a successful business continuity plan. As an Arcserve study shows, only 52 percent of affected companies were able to recover from their data loss in 12 hours or less. Although 95 percent of companies said they had a disaster recovery plan, only a small…

Read more

Data manipulation, the underestimated danger
Data manipulation, the underestimated danger

Every year, World Backup Day on March 31st serves as a reminder of the importance of having a current and easily accessible copy of all important company data to protect against data manipulation. Reliable backups enable faster recovery from damage, interruption or data loss; and especially if files have been encrypted or deleted by a ransomware attack. However, these well-known backup scenarios remain rare. Immutable backups can also protect against the more underestimated threats of data manipulation or malicious insiders. Unforeseeable activities that can significantly damage the trust and reputation of a brand if not...

Read more

Immutable memory protects against attacks
Immutable memory protects against attacks

A survey of cybersecurity experts from companies with more than 1.000 employees confirms that 46 percent of respondents believe that generative AI increases their company's vulnerability to attacks. This trend appears to be already well underway, with 75 percent of respondents confirming that they are seeing an increase in attacks compared to last year - 85 percent attributing this increase to the use of generative AI by cybercriminals. With generative AI, cyber fraudsters have even more options to adapt flexibly, use complex tactics to circumvent traditional data protection solutions and...

Read more

Ransomware attack on IT service providers
B2B Cyber ​​Security ShortNews

A data center owned by the Finnish IT service provider Tietoevry located in Sweden was recently attacked with ransomware. Numerous companies, authorities and universities are affected by this. A lot of data cannot be restored. The Finnish IT service provider Tietoevry is one of the largest IT service providers in Europe. The attackers used the ransomware to encrypt not only the data of numerous Tietoevry customers in Sweden, but also the backups and log files. Therefore, Tietoevry apparently cannot restore the affected data of numerous customers. A press release from Tietoevry said: “While the overall recovery has progressed, services for those affected…

Read more

Recover deleted SaaS data
Recover deleted SaaS data

According to Statista, Microsoft Office 365 controls nearly 50 percent of the global office productivity software market. Surely one or two users of this suite have accidentally permanently deleted an email, but Office 365 has built-in data protection functions that can be used to restore Outlook emails. This includes various email retention policy features that can be individually configured to meet specific legal compliance and operational requirements. In principle, however, the following applies: Exchange Online stores deleted emails for 14 days, up to a maximum of 30 days. Data protection at the highest level Difficult or even...

Read more

Appropriate data security in industry
Appropriate data security in industry

Data security and backups for businesses are easy to ensure in theory, but how does it work in reality? The current case study shows how easily a company can decide on a solution and how particularly easy it is to implement a cloud-supported solution. A case study by Rubrik. Kelvion, a global manufacturer of industrial heat exchangers, has a complex IT infrastructure. This extends across numerous locations and a global sales and production network. Founded in Bochum in 1920, the group grew steadily over the years. The more global it became, the more challenging it became...

Read more