Discover chilling tales of broken and damaged phones—rescued from fire, ice, and more by DriveSavers expert phone data recovery. Learn how lost data, photos, videos, and messages can be retrieved even from shattered Android devices and iPhones.
Cybersecurity: Our Favorite Articles and Tips
At DriveSavers, we’re experts on cybersecurity. We have to be, considering the petabytes of confidential customer data that flows in and out of our data recovery lab. We frequently share our knowledge of data security and cybersecurity with you through blog articles and white papers. Here are a few of our favorites.
Cybersecurity for Everyone
9 Ways to Secure Your Smartphone
Your smartphone—that mini computer that lives in your pocket—deserves the same protection as your personal laptop or work computer.
Use the guidelines in this article to protect your on-the-go information from hackers and thieves.
Read 9 Ways to Secure Your Smartphone
Internet-connected Children’s Toys: 5 Safety Tips
This is a great one for parents.
Run an online search for “internet-connected children’s toys” and you’ll find pages and pages of “smart” tech toys to purchase, from “learning tablets” designed for young children to funny little animals that transmit voicemail messages, all stored online.
How secure are all of these cloud-storage databases? What might these toys be exposing about you or your children?
This article explores the cybersecurity of internet-connected children’s toys and provides five easy-to-follow tips for keeping your children safe online.
Read Internet-connected Children’s Toys: 5 Safety Tips
Don’t Get Caught by Email Phishing Attacks
A lot of smart people are fooled every day by something that looks genuine, but isn’t! Phishing and malware attacks are designed to take something important from you and profit from the theft. This type of attack is directed at individuals and businesses alike.
This article explains what phishing is and how to protect yourself and your business from phishing attempts.
Read Don’t Get Caught by Email Phishing Attacks
Another Crafty Phishing Attack Example
This spoof email looks to be a locked PDF from the very reputable company, DocuSign. It appears that the receiver of this email is required to click a button to unlock an important file. In actuality, the file is an unlocked PDF with a button that links to a malware site.
This short article explains how to identify this type of phishing email and what to do with it.
Read Another Crafty Phishing Attack Example
Email Security Alert – Messages from Contacts
Here’s another example of a phishing attack that hijacks a real person’s email and uses their contact list for nefarious purposes.
This article explains how to identify this type of phishing email and how to protect yourself.
Read Email Security Alert – Messages from Contacts
Cybersecurity for Government, Corporations, Banks, Medical Practitioners and Small Businesses
Cybersecurity Report: The Overlooked Risk in Third-party Data Recovery
This white paper addresses an often undetected or unattended internal and contractual risk—data recovery—that should never be left out of a strong-layered security practice.
Includes:
- 2016–2017 data breach statistics
- Types of sensitive data held by most businesses
- Costs associated with a data breach
- Security standards and protocols for data recovery
- Easy-to-use security vetting checklist
Read Cybersecurity Report: The Overlooked Risk in Third-party Data Recovery
Data Security Compliance: A Cheat Sheet for IT
Whether you work for an organization controlled by compliance standards or you are an independent IT looking to build your enterprise business, industry regulations regarding data security, also known as information security, can sometimes cause a real headache.
This article provides a single set of guidelines to follow that can be applied to all industry regulations at once.