Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Data Recovery

Below you will find reports with the tag of “Data Recovery”

image from The Annual Cybersecurity Behaviors and Attitudes Report 2021

The Annual Cybersecurity Behaviors and Attitudes Report 2021

This report examines cybersecurity attitudes and behaviors of the general public, shedding light on one of the most important aspects of cyber risk - the human factor. This research applies scientific rigor and robust data analysis to help academics, practitioners, and policy makers around the world better understand people-related security issues as they relate to enhancing awareness, influencing security behavior and improving security culture.

(more available)
Added: November 22, 2021
image from The 2021 Ransomware Survey Report

The 2021 Ransomware Survey Report

A survey analysis of 455 business leaders on their sentiments regarding ransomware.

Added: October 2, 2021
image from Ransomware: The True Cost to Business

Ransomware: The True Cost to Business

A survey-driven report of 1,200 cybersecurity professionals from several countries. This survey focuses on the prevalence and impact of ransomware.

(more available)
Added: June 18, 2021
image from State of Ransomware 2021

State of Ransomware 2021

An annual survey of 5,400 IT decision makers on the scope, nature, and ramifications of ransomware attacks.

Added: May 2, 2021
image from Covid-19 Clicks: How Phishing Capitalized on a Global Crisis

Covid-19 Clicks: How Phishing Capitalized on a Global Crisis

This report is based off of a survey of 7,000 office workers around the world. It looks at worker’s understanding of phishing and email clicking habits. It also looks at changes in phishing since the COVID-19 pandemic. They reveal real-world concerns from workers around the globe and offer steps to help businesses and individuals resilient against phishing attacks.

(more available)
Added: December 18, 2020
image from Cybersecurity Awareness Month Survey Report September 2020

Cybersecurity Awareness Month Survey Report September 2020

This study was conducted to better understand consumer behavior around internet-connected devices and perceptions of security. It looks into generational differences in perception and behavior changes during COVID-19.

(more available)
Added: November 6, 2020
image from Information Security and Cyber Risk Management Report 2020

Information Security and Cyber Risk Management Report 2020

The tenth annual survey of risk managers, insurance buyers and other risk professionals. This covers the results of over 400 responses on attitudes and behaviors to cyber insurance and perceptions of risk.

(more available)
Added: October 22, 2020
image from 2020 SMB Cybersecurity Survey

2020 SMB Cybersecurity Survey

Presenting the results of a survey conducted on 2,055 small and medium-sized US businesses. Focuses on the chief cybersecurity concerns expressed by organizations, their planning pre- and post-COVID-19, approaches to remote work, and recovery planning. Cyber insurance attitudes are included.

(more available)
Added: October 21, 2020
image from Zerologon: Unauthenticated Domain Controller Compromise by Subverting Netlogon Cryptography (CVE-2020-1472)

Zerologon: Unauthenticated Domain Controller Compromise by Subverting Netlogon Cryptography (CVE-2020-1472)

This whitepaper explains a new vulnerability in Windows Server that is highly exploitable.

Added: October 18, 2020
image from Moving Forward: Setting the Direction

Moving Forward: Setting the Direction

This report evaluates the state of security in healthcare in 2020, and compares it against 3-years’ worth of historical client data.

(more available)
Added: October 18, 2020
image from Hiscox Cyber Readiness Report 2020

Hiscox Cyber Readiness Report 2020

The fourth annual report from Hiscox. This survey based report collected responses from IT managers, executives, and other professionals across multiple sectors and countries. Focuses on assessing the cyber readiness of firms, budget spend, and losses experienced.

(more available)
Added: June 25, 2020
image from 2019 Mobile App Threat Landscape Report

2019 Mobile App Threat Landscape Report

RiskIQ scans mobile application stores and analyzes the apps presented for potential malware and other threats. This annual threat report covers the security posture of the mobile ecosystem, identifying threat actions, and making time comparisons.

(more available)
Added: June 11, 2020
image from An Insider View to the Increasingly Complex Kingminer Botnet

An Insider View to the Increasingly Complex Kingminer Botnet

A detailed technical analysis of the Kingminer botnet malware, including the C&C network, infection vectors, payload, and auxiliary components.

Added: June 9, 2020
image from DNS Network Traffic Volumes During the 2020 Pandemic

DNS Network Traffic Volumes During the 2020 Pandemic

Review of DNS traffic trends during the 2020 COVID-19 pandemic as an indicator of enterprise activity and possible DDOS events.

(more available)
Added: May 28, 2020
image from The State of Ransomware 2020

The State of Ransomware 2020

A survey, conducted by Vanson Bourne, of 5,000 IT managers on their experiences with ransomware. Discusses prevalence, spread, techniques, and impact.

(more available)
Added: May 22, 2020
image from Naikon APT: Cyber Espionage Reloaded

Naikon APT: Cyber Espionage Reloaded

In the following report, Naikon describes the tactics, techniques, procedures and infrastructure that have been used by the Naikon APT group over the 5 years since the last report, and offer some insight into how they were able to remain under the radar.

(more available)
Added: May 18, 2020
image from Assessing "Cyber Hygiene" in the U.S.

Assessing "Cyber Hygiene" in the U.S.

Wakefield Research partnered with Webroot to conduct an online quantitative research study among U.S. consumers to:

  • Better understand attitudes, perspectives, and behaviors related to cyber hygiene
  • Based on this data, create a risk index (“Cyber Hygiene Risk Index”) to assess the risks associated with susceptibility to cybercrime in each state, ranking the states to determine the riskiest and least risky states in the U.S.
  • Further analyze respondents’ susceptibility to risk by using a series of custom demographic and psychographic metrics to get a more nuanced understanding of what is behind cyber-hygiene levels
Added: May 11, 2020
image from 2016 Cyberthreat Defense Report

2016 Cyberthreat Defense Report

A survey-based report with findings in four major areas: current security posture, perceptions and concerns, current and future investments, and practices and strategies.

(more available)
Added: March 15, 2020
image from How Ransomware Attacks

How Ransomware Attacks

Most blogs or papers about crypto-ransomware typically focus on the threat’s delivery, encryption algorithms and communication, with associated indicators of compromise (IOCs). This research paper takes a different approach: an analysis of the file system activity or behaviors of prominent crypto-ransomware families (hereafter, simply called ransomware).

(more available)
Added: November 25, 2019
image from Cloud Down Impact on the US Economy

Cloud Down Impact on the US Economy

The insurance industry has been asked by Lloyd’s, regulators, and its own senior management to understand its exposure to this type of cyber risk. To address this, AIR has developed a comprehensive database of industry exposures that provides the information insurers need for accurate modelling and has used it to form the basis of the alternative modelling approach described in this report. The results of this cloud downtime scenarios analysis could help insurance managers gain insights into how to grow their cyber business in a controlled and prudent manner.

(more available)
Added: November 25, 2019
image from Cloud Risk Surface Report

Cloud Risk Surface Report

This publication looks into the safety of cloud and on-prem environments.

Added: October 1, 2019
  • ««
  • «
  • 1
  • 2
  • 3
  • 4
  • 5
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 4, 2025 04:08 UTC (build b1d7be4)