The Jungle Disk Blog

Featured Post

Top Five Most Popular Jungle Disk Blog Posts of 2016

by Christina Weaver - Dec 30, 2016


Healthcare Data Privacy and HIPAA Security - Cyber Talk Radio Episode 6

Healthcare Data Privacy and HIPAA Security - Week 6 of Cyber Talk Radio Our guest this week was David Schulz, executive director at Cyber Risk Associates. Show Summary This past Saturday, October 29, the sixth episode of Cyber Talk Radio hit ...

by Bret Piatt / Cyber Talk Radio, Thought Leadership / Nov 1, 2016


Why You Shouldn’t Perform a Bare Metal Recovery After a Malware Attack

Today, I would like to give you a few tips and best practices for recovering after a malware attack. If you are using a bare metal recovery tool after a recent cyberattack, you are not only likely restoring the malware back to your system, but als...

by Trey Fischer / Encrypted Backup, Business Strategy, Technical / Oct 31, 2016


Behind the Scenes at Jungle Disk - Say "No" to 404s

Over the last few months, we at Jungle Disk have been experimenting a lot with our website. So far, we have a new logo, iterating on a new web site design and modifying our approach with the product pages to complement our search engine marketing ...

by Michael DeFelice / Behind the Scenes, Technical, Business Strategy / Oct 28, 2016


San Antonio Spurs ‘Defensive Play of the Game' Highlights

Calling all Spurs fans, ‘Defensive Play of the Game’ highlights brought to you by Jungle Disk! To keep up with the highlight videos, go to the Spurs site here. Looking forward to a great season - Go Spurs Go! Spurs Defense Play of the Gam...

by Christina Weaver / Events, Industry News / Oct 27, 2016


Jungle Disk's Backup Vault Has Your Business’ Back

The Backup Vault is one of Jungle Disk’s most important features. In case you aren’t familiar, Backup Vaults reside on an online disk, which in turn is stored in the cloud. At Jungle Disk, you have an option of storing your data at Rackspace or Am...

by Thomas Garcia / Encrypted Backup, Business Strategy, Technical / Oct 27, 2016


Think Like the Bad Guys - How to Spot Network Vulnerabilities

Around this time of year, I love listening to mystery podcasts to prep myself for Halloween. There is something eery about the “whodunit” genre that gets you identifying with the victims and wondering what you could have done to prevent the variou...

by Beth Watts / Product, Network Threat Protection, Business Strategy / Oct 26, 2016


Human Hacking and Social Engineering - Cyber Talk Radio Episode 5

Human Hacking and Social Engineering - Week 5 of Cyber Talk Radio Our guest this week was Tom DeSot, CIO of Digital Defense. With five episodes under our belt, we’re now adding our show archive into podcast services. Show Summary This past Sa...

by Bret Piatt / Cyber Talk Radio, Thought Leadership / Oct 26, 2016