NanoCore RAT — Malware of the Month, May 2020

NanoCore RAT — Malware of the Month, May 2020

NanoCore — Spanning's Malware of the Month for May 2020 — is an incredibly sophisticated Remote Access Trojan (RAT) that gives hackers free reign over an infected device ...
Pitching SaaS Backup: 3 Obstacles to Expect

Pitching SaaS Backup: 3 Obstacles to Expect

Decision makers are often slow to recognize the value in a SaaS backup solution, even though the merits of Office 365 or G Suite backup are well known. Find out why and ...
Discover the Power of Remote Control with Live Connect in VSA by Kaseya

5 Tips for Successful Remote Workforce IT Management

To ensure your business makes it through these turbulent times relatively unscathed, here are five tips to help you manage your remote workforce ...
Console screen shot of Integrated Dark Web Monitoring in Spanning Backup for Office 365.

Spanning Release Notes: Office 365 Backup with Integrated Dark Web Monitoring

Keep your Office 365 credentials and data secured with the new Spanning Office 365 Backup feature — Dark Web monitoring ...
IDS - HIDS Vs NIDS  -Difference between HOST based IDS & NETWORK  based IDS

Intrusion Detection Systems: A Deep Dive Into NIDS & HIDS

Intrusion Detection Systems (IDS) are instrumental in guarding data from unauthorized access. Learn the main types of IDS and the role they play in data security ...
Insecure Direct Object Reference Vulnerability

Insecure Direct Object Reference (IDOR) — Web-based Application Security, Part 6

| | Cloud and Data Security
Insecure Direct Object Reference (IDOR) vulnerabilities exist when direct object reference entities can be manipulated in order to gain access to otherwise private information. Learn how they work and how to protect ...
OAuth 2.0 access tokens explained

OAuth 2.0: What Is It and How Does It Work?

| | Cloud and Data Security
Learn what OAuth 2.0 protocol is, how open authorization it works, and more importantly, why OAuth is vital for your backup vendors ...
Examples of personally identifiable information as defined by the California Consumer Privacy Act (CCPA).

CCPA: Salesforce Administrators Must Rethink Backup

Salesforce administrators under the CCPA need to rethink their backup and recovery strategies to ensure personal information is accurately backed up ...
A themed image for Ryuk Ransomware; a book with the Ryuk character's face on the front and binary code on the back.

Ryuk Ransomware — Malware of the Month, January 2020

In the world of malware, Ryuk ransomware has gone from a rookie to a pro at a disturbing speed. Here we take a look at what Ryuk ransomware is, how it spreads, ...
Cybersecurity Skills Gap  | Cybersecurity Insights #20

10 Cybersecurity Trends in 2020 You Need to Keep an Eye On

As data moves to SaaS apps like G Suite and Office 365, so will the focus of cybercriminals. Be on top of cybersecurity trends in 2020 to keep your business ahead of ...