![](https://img.helpnetsecurity.com/wp-content/uploads/2021/06/28132545/ransomware_demands-400x200.jpg)
Cybercriminals seeking more than just ransomware payment
Venafi announced the findings of a global survey of IT decision-makers looking into the use of double and triple extortion as part of ransomware attacks. The data reveals that …
![](https://img.helpnetsecurity.com/wp-content/uploads/2022/02/03094729/joe_noonan_2-kaseya-400x200.jpg)
Disaster recovery is critical for business continuity
Business continuity (BC) and disaster recovery (DR) efforts go hand in hand in this digitized world of ours. The former is focused on maintaining business operations rolling …
![fire](https://img.helpnetsecurity.com/wp-content/uploads/2017/11/09102515/fire-400x200.jpeg)
Combating cybercrime: Lessons from a CIO and Marine veteran
A colleague asked me recently if I thought the FBI had finally experienced enough of the cyberattacks plaguing the United States and would now more aggressively pursue the …
![virtual reality](https://img.helpnetsecurity.com/wp-content/uploads/2016/05/09112824/virtual_reality-400x200.jpg)
Why virtual desktops make sense for a virtual workforce
Across the country businesses and public agencies alike are holding virtual job fairs and summits and talking about the effects of the virtual workforce. Faced with skilled …
![work from home](https://img.helpnetsecurity.com/wp-content/uploads/2020/04/28085110/wfh-desk-400x200.jpg)
WFH is here to stay: Five tactics to improve security for remote teams
When the pandemic took hold, most companies were forced to turn their employees into a fully operational remote workforce within the span of one week. And while some …
![data](https://img.helpnetsecurity.com/wp-content/uploads/2018/05/09101103/data-400x200.jpg)
Most employees believe backing up company data is not their problem
Apricorn announced the findings from a Twitter poll exploring data backup and recovery processes. More than 50 percent of respondents noted that they, or their employees, have …
![ransomware](https://img.helpnetsecurity.com/wp-content/uploads/2021/05/12075527/ransomware-hands-400x200.jpg)
Ransomware attacks preparedness lagging, despite organizations being aware of the risks
Hornetsecurity released the results of a global study of IT professionals on their preparedness for ransomware attacks. Survey data showed that although companies are …
![KuberLogic](https://img.helpnetsecurity.com/wp-content/uploads/2021/10/12121809/kuberlogic-logo-400x200.jpg)
KuberLogic open-source platform turns infrastructure into a managed PaaS
CloudLinux launched a new open-core project – KuberLogic – software that allows DevOps to set up scalable, self-healing PaaS on top of your Kubernetes cluster. Available on …
![upload](https://img.helpnetsecurity.com/wp-content/uploads/2021/08/25111551/upload-400x200.jpg)
Cloud and online backups increasing in popularity, but tape usage remains
15% of organizations are still using a combination of disk and tape backups, with 51% now using online or cloud backups, a research by Databarracks has revealed. The annual …
![ransomware](https://img.helpnetsecurity.com/wp-content/uploads/2020/04/27090527/ransomware-yellow-400x200.jpg)
Three reasons why ransomware recovery requires packet data
Data from SonicWall’s 2021 Cyber Threat Report showed more ransomware attacks in the first half of 2021 than in all of 2020. Much of the recent conversation around ransomware …
![backup](https://img.helpnetsecurity.com/wp-content/uploads/2020/04/02103956/back-up-data-400x200.jpg)
A unified approach is the future of data backup
Though disaster recovery and backup solutions have always been critical components for any business, the pandemic put a spotlight on the many threats to data today. Cybercrime …
![lock](https://img.helpnetsecurity.com/wp-content/uploads/2020/05/13131647/lock-data-400x200.jpg)
How do I select a data recovery solution for my business?
Ransomware attacks have been hitting hard lately, with over half of organizations experiencing at least one this year, according to a recent study. Recovering data often means …
Featured news
Sponsored
Don't miss
- Critical Exim vulnerability facilitates malware delivery (CVE-2024-39929)
- Risk related to non-human identities: Believe the hype, reject the FUD
- Realm: Open-source adversary emulation framework
- Discover the growing threats to data security
- Encrypted traffic: A double-edged sword for network defenders