article thumbnail

Best of 2017: Top 7 Articles by Spinbackup

Spinone

As the security threat landscape evolves, enterprise organizations continuously invest into data protection solutions aimed at preventing massive data breaches, Ransomware, phishing scams and other sophisticated cyber attacks. Looking back at 2017 Spinbackup has made it a priority to offer state-of-the-art solutions to the problems above.

Backups 40
article thumbnail

12 Data Loss Prevention Best Practices (+ Real Success Stories)

eSecurity Planet

Customize training materials to address these specific concerns, including data handling protocols, password management , and phishing attempt identification. Keep these copies on two separate types of media: hard disks, cloud storage , and tape backups.

Backups 132
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Prevent Phishing Attacks in G Suite and Office 365

Spinone

One of these is phishing. Phishing is a technique used by threat actors to lure end users into disclosing valuable or sensitive information under false pretenses. There are various types of phishing attacks that are used today that organizations need to be aware of. This helps with the façade of legitimacy.

article thumbnail

Android 7.0+ Phones Can Now Double as Google Security Keys

Krebs on Security

and higher can now be used as Security Keys , an additional authentication layer that helps thwart phishing sites and password theft. Many readers have expressed confusion or skepticism about how Security Keys can prevent users from getting hooked by phishing sites or clever man-in-the-middle attacks.

Mobile 242
article thumbnail

US DHS CISA warns of Iran-linked hackers using data wipers in cyberattacks

Security Affairs

US DHS CISA agency warns of increased cyber-activity from Iran aimed at spreading data-wiping malware through password spraying , credential stuffing , and spear-phishing. ” Experts recommend to have secure working backup procedures, in case of attack, victims could simply recover data from a backup.

Backups 76
article thumbnail

What is Ransomware? Everything You Should Know

eSecurity Planet

Whether deployed by ransomware groups or individuals via ransomware as a service (RaaS) , the most common method of ransomware deployment is a phishing email. Ransomware-proof backups: You can limit the damage caused by ransomware by maintaining an effective backup and disaster recovery plan.

article thumbnail

The Scammers’ Playbook: How Cybercriminals Get Ahold of Your Data

eSecurity Planet

According to statistics from the FBI’s 2021 Internet Crime Report , complaints to the Internet Crime Complaint Center (IC3) have been rising since 2017. Phishing complaints were reported over 300,000 times in 2021 to IC3, the only Internet crime to crack 100,000+ complaints. Phishing attacks made up 40% of all attacks in the sector.