Gillware Data Recovery Blog

Every week Gillware solves hundreds of complex data recovery cases. We try to pick the most interesting cases to write about in our data recovery blog. Our lead blogger Will worked in our data recovery lab for over a year before joining our marketing team to assist with the data recovery blog. Gillware has performed data recovery services on just about every piece of storage equipment imaginable, even electronic holiday ornaments.

Please subscribe and enjoy!
April 13, 2018
Cyberattacks and Data Breaches Banner Under Armor Equifax MyFitnessPal Boeing Uber

Why Do Cyberattacks and Data Breaches Happen, Anyway?

Equifax, Uber, Yahoo, Boeing, UnderArmor, MyFitnessPal, Panera, and even US power plants and gas pipelines. Private sector or public sector, big or small, it seems cyberattacks […]
March 29, 2018

WannaCry and Global Cyber Security Threats: Y2K 2.0?

UPDATE: MARCH 29, 2018 While the initial storm from May 2017 may have long since subsided, WannaCry is still out there, still being passed around by […]
May 17, 2017
Ransomware Prevention

Ransomware Prevention Guide by Gillware Digital Forensics

April 5, 2017
Easily making strong passwords with high information entropy with Keepass

Making Strong Passwords to Protect Your Data

Making strong passwords is hard work—but it’s worth it. Leaving your bank accounts, social media accounts, email accounts, and devices protected by insecure, easily-guessed, and easily-broken […]
March 2, 2017
The Cloudbleed bug may have affected thousands of websites.

Cloudbleed: What It Means for Users and MSPs

On February 23, 2017, Cloudflare, an internet company providing essential infrastructure and services to thousands of websites, announced it had found and rectified a bug in its […]
January 24, 2017
FamilyTreeNow may have more data on you than you'd feel comfortable sharing with the world.

A Note for IT Providers on FamilyTreeNow and IT Security

A few of my friends on Twitter alerted me to FamilyTreeNow in the past week. When they searched their names on the site, they were able […]
//]]>