Category Archives: Back up

  • 0

“How Clean Is Your PC?”

Dear Blast Readers,


When it comes to your PC’s Cyber security do you do everything possible to prevent Cyber-attacks and data breaches? Do you use strong passwords? Do you know what constitutes a strong password? Do you avoid any suspicious emails that could lead you into a phishing attack? Do you use two-factor authentication on the accounts that allows you to do so? Have you ever wondered if that is enough? If that is really all it takes to secure your digital information?


When you hear the phrase “spring cleaning” you automatically think of cleaning your home. Doing the dishes, sorting cloths, and scrubbing every inch of your home. But, “Spring cleaning” can also refer to cleaning up and separating your digital junk from your valued digital information.


If you think that you do not have digital junk, you do. Whether it is old and forgotten email accounts, forgotten thumb-drives, or years’ worth of information in the download folder, everyone has digital junk


All unwanted and forgotten files are considered liabilities, a danger to you and your valuable digital information. In the event your digital devices are hacked, stolen, and/or lost, holding onto accounts and files you do not want and/or need opens you up to all kinds of risks. So, cleaning your digital devices is important when securing them.


So, where do you start your digital “spring cleaning”?

  1. Address your physical devices. Devices should be cleaned, destroyed, and disposed of properly. Only after you go through all the data and back-up what you want to keep.
  2. Go through your desktop and all your documents. It is important to go through and get rid of any old documents containing personal information, such as: medical and banking information.
  3. Delete any emails you don’t need or want. With your email being the data center of your online life, secure the emails you want to keep and delete the ones that you do not want.
  4. Cancel any account you no longer use. Before deleting any software, clean out and close the account. By doing so, this makes sure the company retains the smallest amount of information as possible about you. It also prevents any more information about you from being collected.
  5. Cancel any email account you no longer use.


If you have any questions about Data Security, Cyber Attacks, Cyber Security, or Computer Forensics contact FDS Global. You can reach us at our office at (954) 727-1957 or by email at RMoody@FDS.Global. Please feel free to visit our website at www.FDS.Global.

  • 0

“Cyber Extortion”

Dear Blast Readers,


As the number of companies and enterprises whose companies rely heavily on the Internet rises, so does the number of opportunities that the cyber extortionist have. The Extortionists now have more chances to get inside a company’s/enterprises systems and extort their data for money.


“Cyber Extortion” can be described as a crime that involves an attack or threat of attack with a demand for money to stop the attack. Cyber Extortion can take on many forms, including then following:

  • Denial of Service Attack, also known as a DoS attack. (A DoS attack is a cyberattack where the cybercriminal looks to make a machine or network unavailable to the intended users. This happens when the cybercriminal temporarily to indefinitely interrupt or suspend services of an internet connected host
  • Ransomware (Ransomware can be defined as a malicious software that has been created to block access to a computer system until the cybercriminal(s) are paid a sum of money.)


Most Cyber extortion efforts are started because of a malware infested email and/or compromised website. The website/Email/Email attachment has been infected before the user has opened it. Once the victim has opened the infected URL, Email and/or Email attachment then the device that it has been opened on is infected.


Cyber extortion is quickly becoming a permanent feature in the cybercrime community, and it is a feature that can potentially affect any organization, enterprise or business. Even the companies that are best defended do get breached. Those that work with the thought that they are going to be targeted sooner or later, and adapt their techniques are less likely to suffer greatly.


The following are suggestions for how your Business, Company, Organization and/or Enterprise can prepare for a Cyber Extortion Attack:

  • Understand the evolving cyber threat your organization faces at granular level. (Who is likely to attack you?, What would they attack?, What is their capability to do so?)
  • Have systems in place that allow you to detect attacks. (If you can stop them this system will allow you to get on the front foot terms of response.)
  • Ensure your critical data is regularly and securely backed up (So you can restore from recent backups if hit with ransomware).
  • Ensure corporate response plans are fit for purpose for likely extortion scenarios. (Make sure these plans are tested and exercised so they operate smoothly if/when there us a crisis.)
  • Do not deal with an extortion attack as an IT Incident. (Make sure you manage the business crisis too.)
  • Ensure that you are able to call a specialist in the event of serious extortion.


If you have any questions about “Cyber Extortion” feel free to visit our website at www.FDS.Global, or give our office a call at (954) 727-1957





**Relate Material**

To lessen to risk that comes with Cyber Extortion, experts believe (and recommend) for users to educate themselves about Phishing Exploits and back up their devices regularly.

  • To Read FDS Global’s Blast on Phishing, Click Here To Watch—
  • To Read FDS Global’s Blast on the importance of backing up your devices, Click Here To Watch—
  • Watch as Robert Moody takes a cell phone and retrieves hundreds of contacts that were thought to be lost, as well as talk about the importance of device backups on “Help me Howard”. Click Here To Watch—