Skip links

Cyber Backup

Category Archive Subtitle
Threatening with Coronavirus Blog Featured Image

Beware the Newest Coronavirus Email Scam

It is a known fact that cybercriminals love to hijack global news headlines to spread their scams and increase their profits. This approach has reached a new moral low recently as cyberattackers threaten to deliberately infect people not with ransomware or malware, but with the
Medical Facilities Blog Featured Image

Cyberattacks Against Healthcare Targets Aren’t Going Away Anytime Soon

The New COVID-19 Reality The new coronavirus-induced reality has brought new challenges and new risks, specifically in cyberspace, as more and more organizations are required to go digital.  It’s no secret that cybercriminals often take advantage of vulnerable targets during times of crisis. Unfortunately, today’s coronavirus epidemic is no exception. Not only are businesses and governmental organizations
Work From Home Blog Featured Image

COVID-19 Opens Pandora’s Box of Cybercrime

The Lesser Known Side Effect No one needs a reminder of the enormous toll that the COVID-19 pandemic is inflicting on lives around the globe. It is affecting our physical and mental health, our economic prospects, and our connections to our loved ones. But as
Cupid Chip Blog Featured Image

CyberFit Cupid’s Top Tips to #LoveYourData

Got love on the brain? Let CyberFit Chip’s February alter ego, CyberFit Cupid, guide your googly eyes toward a new valentine – your organization’s data! With data breaches climbing 33 percent last year and ransomware targeting state and local government at record levels, this underappreciated
CyberFit Tips Blog Featured Image

Trick or Treat Yo’self to Our Top 5 Cyberfit Tips

As you get your costumes and candy ready for Halloween, here’s another fun October fact – it’s National Cybersecurity Awareness Month! To help celebrate, Cyberfit Chip’s alter ego, Count Chipula, has turned to the good side this month, so he can offer up key tips to help
Firewall Ports Featured Image

99 Problems but Backup Firewall Ports Aren’t One

How do I love thee network engineer, let me count the ports. 3, that’s right just 3 ports (okay, maybe 5 if you want automated agent installs) you will need to open on your firewalls to get fantastic, fully functional data protection for your entire
Self-Protecting-Data-Diagram Blog Featured Image

Self-Protecting Data – A Future-Proof Cyber Doctrine

The Data Protection Evolution In the decades since cybersecurity became a key priority for companies and federal government agencies alike, we have witnessed a necessary evolution in information security doctrine and strategies. For years, layered data protection tools – from perimeter defense to identity management