News and Blog

2022-11-09
Pete Nourse

Security threats are evolving as quickly as the technologies used to thwart them. Attackers have introduced new and modified strategies to attack networks and systems. Rootkits are one of the common tools that attackers are using today.

2022-11-01
Pete Nourse

At its simplest, the definition of authentication is the verification process, the determination of whether one is who they say they are. In computing terms, authentication refers to verifying a person or device. A common example is entering a username and password when someone signs into a website.

When a person enters their username and password, it lets the website know who they are and that it is the correct user accessing or trying to access the website. The password and username combination is one of the most common examples of authentication.

2022-10-25
Pete Nourse

Although they have become more popular today, vendor products and guarantees are nothing new. At face value, vendor guarantees are an insurance plan, preparing users for the worst. In the modern, digitally-driven world, data is everything. This is why attacks such as ransomware and malware attacks are so dangerous.

2022-10-18
Pete Nourse

In the event of a disaster or hardware failure, cloud backups, also known as online backups or remote backups, provide a means of saving a copy of a file or database to an external server. Typically, a third-party service provider hosts a secondary server and data storage system, and the backup customer is charged a fee based on the amount of storage space or capacity used, the amount of data transmission bandwidth used, the number of users, the number of servers, or the number of times the data is accessed.

2022-09-16
Pete Nourse
CDR stands for Content Disarm & Reconstruction, a data sanitization solution that assumes all files are potentially malicious, hence sanitizing them and rebuilding each file to ensure optimal usability with safe content.
2022-08-25
Pete Nourse
Ransomware gangs are becoming smarter, with more RaaS ecosystems adopting double or triple extortion mechanisms. Contact Asigra to find out how ransomware gangs operate and ways to prevent ransomware attacks.
2022-08-15
Pete Nourse
Asigra covers all you need to know about how Autonomic Healing keeps your data safe. For innovative data protection solutions & more, contact us today!
2022-07-14
Pete Nourse
Asigra covers how ransomware attacks have increased in recent years & steps to take to protect yourself. For more about our innovative data protection solutions, contact us!
2022-06-30
Pete Nourse

The ongoing conflict in Ukraine has resulted in a tremendous loss of life, and property, and caused massive upheavals in the global supply chain and economy. Few are aware, however, that the Russian government appears to have also conducted a systematic series of cyber-attacks alongside its military assault in Ukraine.

2022-06-01
Pete Nourse

The abrupt and complete shift to remote work in the wake of the global pandemic had many companies scrambling to secure their infrastructure. Most CSO, CIO, and senior IT managers have spent weeks trying to make their networks secure and accessible, especially as ransomware and other cyber-attacks reached a fever pitch. Organizations spared no expense in ensuring the security of their backups with 3-2-1 strategy, air gapping and immutable backups.