2 weeks ago
While blockchain has earned its most significant claim to fame by making possible the rise of cryptocurrencies like bitcoin, researchers continue to propose a number of new uses for this technology. This includes everything from linking global supply chains to guaranteeing the validity of election results. And, given the recent concerns about the security risks posed by the Internet of Things (IoT), the blockchain has also been proposed as a potential security fix for any physical infrastructure deploying Internet-connected…Full Details
4 months ago
Most people will never have a fire in their home or office, but everyone can remember going through a fire drill at some point. The process of evacuating a building and meeting outside prepares us for the actual conditions we might face in a real fire.
Many companies go to great lengths to prepare for disasters like fires and floods, but most remain woefully unprepared to deal with ransomware—despite the fact that ransomware attacks are far more likely. One way…Full Details
2 months ago
Cybercriminals use phishing emails with malicious links or attachments to distribute ransomware more than any other method. Their goal is to fool unwitting victims into downloading the nasty, file-encrypting malware so they’ll be forced to pay a ransom in exchange for the decryption key.
CSO Magazine last year found that 93% of all phishing emails contain ransomware. To protect yourself and your business, it’s important to know what emails and tricks to avoid. Here’s a look at phishing emails that…Full Details
5 months ago
The process of making sure your business is prepared to protect its data from ransomware and other disasters depends largely on the characteristics of your specific computing environment, such as the type of data you have and how it is stored. To begin the process of implementing or optimizing a data protection plan, you need to gain a full understanding of how data is used within your organization and what needs to be protected the most. Start by asking yourself…Full Details
2 weeks ago
Katie Niemi and Eric Vanderburg
While being diligent with your online shopping is important and necessary, there are a few other steps that you can take to help protect your information throughout the holidays. Over the next few days and weeks, many people will find themselves traveling to visit with friends and family to celebrate. Use these tips to help stay safe this year.
Setup Two Factor Authentication (2FA)
Before heading out on your trip, take a few minutes to set…Full Details
1 year ago
The latest version of Cerber ransomware is targeting database applications and putting business’s most valuable data at risk, according to recent reports.
Large database applications such as Oracle, Microsoft SQL Server, MySQL and others contain critical data for things like Enterprise Resource Planning (ERP), Customer Relationship Management (CRM) and Electronic Medical Record system. And the latest version is aiming to encrypt all of them in addition to documents, spreadsheets and multimedia files.
How Cerber ransomware works
Ransomware victims are not chosen…Full Details
Eric Vanderburg. All rights reserved