1 day ago
Many view the cybercriminal as an unknown. This is due, in part, to the difficulty inherent in tracking down individual attackers. However, we do not need to identify each individual cybercriminal to understand cybercriminals, and this understanding is invaluable.
Sun Tzu, the legendary Chinese tactician said, “If you know the enemy and know yourself, you need not fear the result of a hundred battles. If you know yourself but not the enemy, for every victory gained you will also suffer…Full Details
3 months ago
Most people will never have a fire in their home or office, but everyone can remember going through a fire drill at some point. The process of evacuating a building and meeting outside prepares us for the actual conditions we might face in a real fire.
Many companies go to great lengths to prepare for disasters like fires and floods, but most remain woefully unprepared to deal with ransomware—despite the fact that ransomware attacks are far more likely. One way…Full Details
1 month ago
Cybercriminals use phishing emails with malicious links or attachments to distribute ransomware more than any other method. Their goal is to fool unwitting victims into downloading the nasty, file-encrypting malware so they’ll be forced to pay a ransom in exchange for the decryption key.
CSO Magazine last year found that 93% of all phishing emails contain ransomware. To protect yourself and your business, it’s important to know what emails and tricks to avoid. Here’s a look at phishing emails that…Full Details
4 months ago
The process of making sure your business is prepared to protect its data from ransomware and other disasters depends largely on the characteristics of your specific computing environment, such as the type of data you have and how it is stored. To begin the process of implementing or optimizing a data protection plan, you need to gain a full understanding of how data is used within your organization and what needs to be protected the most. Start by asking yourself…Full Details
2 weeks ago
As the size of the Internet of Things (IoT) continues to grow, so too do the potential security risks for enterprise IoT as attackers target it. Gartner estimates 8.4 billion IoT devices will be in service this year and that by 2020, we will have 26 billion IoT devices connected. These devices generate an enormous amount of data that must be processed and secured. Existing cloud systems are ill-equipped to handle such data due to the latency involved…Full Details
12 months ago
The latest version of Cerber ransomware is targeting database applications and putting business’s most valuable data at risk, according to recent reports.
Large database applications such as Oracle, Microsoft SQL Server, MySQL and others contain critical data for things like Enterprise Resource Planning (ERP), Customer Relationship Management (CRM) and Electronic Medical Record system. And the latest version is aiming to encrypt all of them in addition to documents, spreadsheets and multimedia files.
How Cerber ransomware works
Ransomware victims are not chosen…Full Details
Eric Vanderburg. All rights reserved