Get the latest updates, news and tips about cybersecurity, ransomware, virus and malware threats, data protection and how to get the best of your reevert appliance.
Once you are done evaluating reevert, follow these simple guidelines to get your data migrated to your reevert virtual appliance instances in production. We covered everything you need to have a smooth transition.Read More
The ransomware fight is just getting dirtier and dirtier. Ransomware is now being sold as a service, over $209 million in damages has been reported for Q1 (FBI) - the list goes on… Ransomware used to mainly just target end-users. Now, attackers mostly target larger victims such as businesses and corporations because the payout is usually much higher.Read More
IBM states that in 2015, manufacturing was the second most targeted industry for cyber attacks. As a result of this finding, cybersecurity concerns are taking the center stage on manufacturers’ list of priorities - in the top 10 section, to be exact.Read More
reevert can connect to your Amazon AWS account to perform S3 based cloud backups. This article shows you how to make sure you have enough off-site backups, while keeping your S3 storage costs down by applying a few simple guidelines.Read More
Businesses acknowledge the grave dangers of a ransomware attack, yet 84% of them say that they would choose not to pay the ransom. Ransomware attacks have the power to halt your operations and as any business owner can agree, time down equals money lost.Read More
Depending on how your data is changing on a reevert volume, you may see a lot of space being reported as snapshots usage.This tip of the day will help you free up space if you need to.Read More
A week after Microsoft released the big Anniversary Update, a new update has rolled out. They released a variety of patches and fixes, many focused on boosting security. Fixes were added on Internet Explorer 11 and Microsoft’s Edge browsers to improve the overall reliability and security.Read More
The newest form of ransomware (if we dare call it that) looks the part but breaks the rules. Ranscam operates similarly to ransomware in the way of encrypting files for a payment, but in this case, you won’t be getting your files back.Read More
In the ever-growing world of technology, the list of threats has only gotten worse. Accounts of cybercrime have gone through the roof as of late and they don’t show signs of stopping. CEO fraud, real estate scams, ransomware… the list goes on. Today, we’re highlighting three pieces of proof that cyber crime isn’t something to ignore.Read More
The world of ransomware is dirty enough as it is, but by the looks of it, it’s getting even dirtier. Ransomware (a mashup of the words ransom & malware) has been a growing problem in technology over the years. Ransomware is now considered to be the most lucrative form of malware to date - and some Fortune 500 companies might have caught on to that.
Imagine running a successful corporation and with one simple click of a mouse, your data is locked. A message pops up telling you that your data has been encrypted and that you must pay $50,000 to regain access. The devastation sets in when you realize that you are now one of millions that have been hit by ransomware.Read More
For a hassle free 30 day trial, click the "Free Trial" button, download and deploy a copy of the appliance. No Credit Card required.