data protection

  1. R

    Windows 10 Fresh Start???

    I am trying to start fresh on my work laptop. I am fine with starting completely over as well as buying a new OS. Just wondering if its possible and how to go about it. The skinny... I was planning on merging companies with a buddy and we purchased me a laptop for work. He handled all the tech...
  2. How Scale-out Converged Architectures Solve Data Protection and Storage Challenges

    Date: Tuesday, May 21, 2019 Time: 02:00 PM Eastern Daylight Time Duration: 1 hour The amount of data we generate on a daily, and even hourly basis continues to grow. And not all data is created equally. Unstructured data is creating massive challeng Continue reading...
  3. M

    Windows 10 Problem with File History

    I am having trouble using file history. If I accept the defaults by just pressing Backup Now the result is just an empty 2Mb file. If I add Documents and Desktop the result is still just an empty 2Mb file. What I wish is to do is a file backup followed by daily incremental backups of the...
  4. Threat Trend Predictions for 2019

    Threat trends based on Trend Micros research and data protection network. Mapping the Future: Dealing With Pervasive and Persistent Threats - Security Predictions - Trend Micro USA
  5. R

    Windows 10 Interesting Newscast Concerning A Breach Of Your Security

    Hello, A Philadelphia tv news station channel 6 had an interesting story to report about this subject. In summary, A website can alert you if your data has been breached. so that internet users can change their passwords. Check it out and let me know what you think. Go to: Link Removed...
  6. L

    Windows 10 Help with finding backdoor

    Ok, so i have been hacked. Even with rsa key, this person still gets in into my ssh server. I watched bitvise popup and say "accepting connection from china on ip 111.x.x.x" So somehow they are getting in and i do not know how. As of now, the server is turned off. here is a pic. So how do i...
  7. Microsoft’s Cyber Defense Operations Center shares best practices

    Today, a single breach, physical or virtual, can cause millions of dollars of damage to an organization and potentially billions in financial losses to the global economy. Each week seems to bring a new disclosure of a cybersecurity breach somewhere in the world. As we look at the current state...
  8. N

    Windows 10 how to Encrypt Files or Folders on Clients!

    Encrypting folders and files is a way to protect them from unwanted access. Encrypting File System (EFS) is a feature of Windows that allows you to store information on your hard disk in an encrypted format. Other forms solutions for encryption are available that can provide the same level of...
  9. AA18-337A: SamSam Ransomware

    Original release date: December 03, 2018 Summary The Department of Homeland Security (DHS) National Cybersecurity and Communications Integration Center (NCCIC) and the Federal Bureau of Investigation (FBI) are issuing this activity alert to inform computer network defenders about SamSam...
  10. TA18-276B: Advanced Persistent Threat Activity Exploiting Managed Service Providers

    Original release date: October 03, 2018 Systems Affected Network Systems Overview The National Cybersecurity and Communications Integration Center (NCCIC) is aware of ongoing APT actor activity attempting to infiltrate the networks of global managed service providers (MSPs). Since May 2016...
  11. Privacy and Security Discussion

    What do to protect your identity online? What's your threat model? How did you come up with your threat model? What are your primary concerns with your information being online and the online services and apps you use? How do you protect yourself online? Do you use Gmail or Protonmail? Do you...
  12. R

    Windows 10 Hard Drive & Virus

    Does a virus affect other components besides the hard drive, such as memory etc?
  13. Trusted Cyber Physical Systems looks to protect your critical infrastructure from modern threats in the world of IoT

    This solution seeks to provide end-to-end security that is resilient to today’s cyber-attacks so our industrial customers can operate their critical infrastructures with confidence and with no negative impact to their intellectual property and customer experience. As the Internet of Things...
  14. How do you balance privacy and security

    For a while now I've been trying to avoid Google and Microsoft services as much as possible. Yet we all know that's not probable if you want to function normally in today's world. Well I've kind of hit a point where the geeky side of me has won over the cautious once bitten twice from the...
  15. D

    Suspicious file discovered in System Volume Information drive.

    Hello, I was conducting a deleted file recovery using EaseUS Data Partition Recovery. I came across a file labeled "MountPointManagerRemoteDatabase.MountPointManagerRemoteDatabase" The file shows up as 0 KB when I tried to submit it to Microsoft for malware analysis. So, the system Microsoft...
  16. J

    Windows 10 Bitlocker benefits for PCs that dont leave the office?

    We have a few laptops in our office that we are looking at putting some encryption on as they often leave the office. Bitlocker seems the best solution with it already on Windows 10 and free. I just wonder is Bitlocker worth putting onto the desktop PCs that are in the office and don't ever...
  17. T

    Windows 10 A way to lock folders?

    I manage an online historic archive for a local historical society. We have many documents, pictures, etc., posted in a Dropbox account, and provide links for all who desire. I'm concerned that one of us (me or one of the volunteers who has access to the account/collection) might someday...
  18. Windows 10 Pro for Workstations: Power through advanced workloads

    In the new world of work, advanced professions increasingly require high-performance computing capabilities. We’re working to ensure Windows meets your needs, even in demanding and mission-critical scenarios, which is why we Link Removed in August. For data scientists transforming big data into...
  19. Cybersecurity and Data Protection: Learning the New Rules

    Sponsored by: KeepItSafe - Date: Thursday, 12/14/17 at 2:00 PM EST Continue reading...
  20. Office 365 Data Protection: Mind the (Backup) Gaps

    Sponsored by: Druva Continue reading...