Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Data Recovery

Below you will find reports with the tag of “Data Recovery”

image from Ransomware:How To Predict, Prevent, Detect And Respond

Ransomware:How To Predict, Prevent, Detect And Respond

This report asserts that, “Many organizations still follow an outdated approach to cyber security, relying solely on a defensive perimeter to protect their infrastructure.” The report recommends a more robust, iterative approach, which can be broken down into four phases, Predict, Prevent, Detect, and Respond.

(more available)
Added: October 13, 2018
image from Australian Companies Leaving Themselves Exposed On Security And Compliance:Survey

Australian Companies Leaving Themselves Exposed On Security And Compliance:Survey

This paper presents the results of a survey conducted in Australia to understand how prepared companies were for cyber breach situations, and compliance.

(more available)
Added: October 12, 2018
image from Best Practices For Protecting Your Data When Employees Leave Your Company

Best Practices For Protecting Your Data When Employees Leave Your Company

When employees leave a company, whether voluntarily or involuntarily, it is quite common for them to take sensitive and confidential data with them. This paper examines this problem in detail and provides solutions for employers to mitigate the risks.

(more available)
Added: October 12, 2018
image from SecureWorks Threat Intelligence Executive Monthly Report August 2016

SecureWorks Threat Intelligence Executive Monthly Report August 2016

This report from August 2016 takes a look at a variety of threat events, and provides insight and solutions for those issues.

(more available)
Added: October 12, 2018
  • ««
  • «
  • 5
  • 6
  • 7
  • 8
  • 9
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 4, 2025 04:08 UTC (build b1d7be4)