Smartly defining RPO and RTO for Disaster Recovery Plans

Smartly define RPO and RTO

Share this:    Recovery Point Objective (RPO) and Recovery Time Objective (RTO) are 2 most important parameters for a disaster recovery and business continuity plan. RPO is referred to the point in past which you will recover to in case of any disaster. In another words, it is the threshold of how much data you can afford […]

Continue reading

Formbook Malware spreading widely by clicking Microsoft URL shortcut files in your emails

Do not click Microsoft attachments from unknown senders Formbook

Share this:    Be careful when you receive attachments to an email, it can be an entry point to Formbook Malware. Formbook malware mainly steals data from forms tracking keystrokes and form submissions, hence the name Formbook. It can also execute several commands on the victim’s machine from the attacker’s servers. It is widely being spread via […]

Continue reading

Rarog – A cryptomining Trojan is out in the wild


Share this:    A malware family Rarog is out in the internet and being excessively used by the cyber criminals to execute cryptocurrency mining operations. Reseachers claim it to be an appealing option for hackers due to its low cost, easy configurations and support for multiple cryptocurrencies. Palo Alto Networks’ Unit 42 research team, which posted a blog on […]

Continue reading

Slingshot, an APT Malware making its way through routers in the Network


Share this:    An APT (Advanced Persistent Threat) malware, Slingshot, attacks victims by entering via routers and gaining kernel access to control the device entirely. According the Kaspersky researchers, this malware has unique tactics into entering the network as well as effectively stealing sensitive information by hiding itself in the plain day light. It is created by […]

Continue reading

Microsoft Office 365 provides new Advanced Security Features

Microsoft Office 365 with added Security features

Share this:    Microsoft Office 365 is widely popular work office suite, among the SMBs. Hence, no doubt that it has become one of the favourite targets of cyber criminals for viruses, ransomware scams and phishing attacks.  Last year we encountered some vicious ransomwares, like Wannacry and NotPetya, which had wreaked havoc across the globe affecting millions […]

Continue reading

Is blockchain the alchemy to DDoS attacks?


Share this:    DDoS(Denial of Distributed Service) attack is a type of cyber attack that involves a large number of computers and huge volumes of traffic to overwhelm a server or network, slowing it or rendering it completely unresponsive. Victims of a DDoS attack consist of both the end targeted system and all systems maliciously used and […]

Continue reading

Optimizing Disaster Recovery plans to get the best results

Optimizing your Disaster Recovery Plan

Share this:    To assume that IT disaster will not happen to your organization because of its upbeat security and support is living like an Ostrich hiding his face under sand after seeing a hunter. Disasters will happen and the only way to keep them from affecting the business is to stay prepared. A Disaster recovery plan […]

Continue reading