Case Study: Ransomware Case at Gurnick Academy of Medical Arts. How to Protect Your Organization

Case Studies 0 254

Ransomware Case Study

Gurnick Academy of Medical Arts is a private nursing school in California with around 400 employees and over 2,000 students.

A few months ago the school faced a data loss disaster when an instructor inadvertently infected his classroom computer with ransomware that had been brought from home on a USB drive. When the instructor tried to access his lectures, he found that all the files had been encrypted. Instead he was faced with a ransomware note demanding 1 bitcoin ($740) to decrypt the files.

Read more

Data Loss Prevention Tool: What is It And How Does It Work

Data Loss Prevention Tool- What is It And How Does It Work

A general Data Loss Prevention definition (DLP) would be a strategy for stopping end users (such as company employees) from sending sensitive data outside the corporate network.

A DLP tool may use several different technologies and tools in order to protect data so that it cannot be accidentally or maliciously shared with people outside the company or uploaded to private cloud storage.

Read more

Case Study: How to Prevent Data Leaks When an Employee is Leaving Your Company

spinbackup CASE STUDY how to prevent data leaks

One of our customers, a company that is the leading CRM solutions provider, facing a problem when an employee left the company and tried to get access to corporate data. Thanks to Spinbackup’s innovative security tools, the company could securely transfer the employee’s data to another account to be managed and monitor the employee’s behavior until his departure.

Dealing properly with departing employees is important for any business to prevent data leaks, particularly if that employee has had access to sensitive corporate data.

Read more

Spinbackup DLP Features: G Suite Shared Items Control and Credit Card Number Detection for Gmail

Spinbackup DLP features

Your own employees may be a bigger risk to the security of your data than anything else. Data breaches are commonly caused by employees either maliciously (47% of employees think that someone in the company would steal company information) or unintentionally, because they don’t realize their actions may be putting company data at risk.

Over 70% of IT security professionals say that they are not confident that employee access to confidential files can be controlled and managed, and over half believe company insiders to be the major cause of data breaches.

Read more

Cloud-to-cloud Transfers: Security Issues and How to Detect Them


The cloud computing boom has brought many benefits to businesses regarding increased productivity and easier accessibility to corporate online systems. Unfortunately, it has also introduced some new security concerns and an increase in the number of data breaches that occur each year.

The main reason for this is that cloud services make it much easier to access and share data from outside the organization. In a traditional computing model, data breaches are most commonly caused by stolen hardware or a malicious attack on company systems. Data breaches from the cloud may simply be caused by a careless employee sharing files with the wrong person.

Read more

10 of the Riskiest Mobile Apps You Probably Downloaded in 2016

Spinbackup top riskiest mobile apps downloaded 2016

If your company has a BYOD policy, it can be extremely difficult to manage the apps that are installed and used on users’ own devices that are used for work. These apps can often help improve productivity and collaboration, but they can also introduce many new security risks.

User installed apps have a couple of main drawbacks. One is that employees are likely to download popular apps that are used by millions of other users. This makes them an attractive target for hackers, purely because of the potential impact that a successful attack could have. These apps are usually easy to use and make sharing information simple, making them attractive for users, but are also typically less secure than enterprise-level apps.

Read more

Top 5 Steps to Securing Your Device From Malicious Behavior

Spinbackup Top 5 Steps to Securing Your Device From Malicious Behavior

Today, mobile devices, mostly tablets and smartphones, are widely expanding and becoming an integral part of our daily life. Users are increasingly storing their personal data on the devices, which they practically do not let out of their hands. It’s practical and useful, but at the same time, it gives rise to new problems. Easily accessible valuable information increases the risk of online threats. And so, every year, the security of mobile devices (and the stored data) is being given more attention.

Read more

Case Study: How to Protect G Suite Super Admin Account Against Hijacking


As a G Suite domain administrator, have you ever thought how often password cracking attempts are made on your account at Google? Are you even aware if an unauthorized attempt to access your account has taken place?

The G Suite admin panel is a very useful feature of G Suite that can be put to good use by IT administrators in businesses, schools, and other organizations. From the admin panel it is possible to manage several administrative tasks, however the power it gives also means that it can be very dangerous if it falls into the wrong hands.

Have you ever thought what happens with users and data if a cyber-criminal can somehow access your G Suite admin account?

Read more