Happy Monday fellow Linux geeks and Open Source enthusiasts! In this week's newsletter we examine and compare our favorite Linux backup solutions for preventing data loss in a ransomware attack, explain the anatomy of a Linux ransomware attack and discuss Linux rootkits and why they are a threat to your system. How can you protect against ransomware and rootkits on Linux? Read on to find out.

Have a question about or a comment on one of this week's articles?  Let's discuss! Read on to learn more about these topics.

Yours in Open Source,

Brittany Signature 150

Best Linux Backup Solutions to Prevent Data Loss in a Ransomware Attack

13.Lock StylizedMotherboard

In this article, you'll learn about our six favorite Linux backup solutions, and how they compare.

Learn more about best linux backup solutions

What You Need to Know About Linux Rootkits

32.Lock Code Circular

Learn about Linux rootkits, how to detect them and how to prevent them from being installed on your system in the first place.

Learn more about what you need to know about linux rootkit

Anatomy of a Linux Ransomware Attack

11.Locks IsometricPattern

In this article, we’ll examine the anatomy of a Linux ransomware attack, explore the magnitude of the ransomware risk Linux users face compared to Windows users and offer some tips and advice for protecting against Linux ransomware.

Learn more about anatomy of a linux ransomware attack