Tag Archives: Backup

The process of making sure your business is prepared to protect its data from ransomware and other disasters depends largely on the characteristics of your specific computing environment, such as the type of data you have and how it is stored. To begin the process of implementing or optimizing a data protection plan, you need to gain a full understanding of how data is used within your organization and what needs to be protected the most. Start by asking yourself these four questions: 1. What data do I have? The first thing…

Continue reading

Cybercrime is very much a psychological game and ransomware is no exception. Psychology plays a major role in almost all aspects of ransomware from the moment an attack is launched to the moment the victim pays—or refuses to pay—the ransom. Psychology of ransomware distribution Most ransomware is distributed through phishing emails, instant messages, and text messages. Distributors use psychological tactics designed to create a sense of urgency and force the victim to click a malicious link or attachment quickly. This preys on a person’s emotions, especially fear. Victims are told they…

Continue reading

Ransomware continues to be a huge problem for companies and consumers—and a major source of income for cybercriminals. Malicious hackers using CryptoWall ransomware extorted $18 million last year, according to the FBI, and that’s just one of many ransomware variants. Microsoft has detected a 400% increase in ransomware attacks since 2015. This sad fact is that the ransomware industry continues to grow because people continue to pay ransoms. Logic would dictate that we simply stop paying ransoms and ransomware will end. But this is much easier said than done. Businesses,…

Continue reading

Ransomware computer viruses are becoming more sophisticated—and so are the attacks that make use of ransomware. In some cases, ransomware is used to disable access to a machine so criminals can perform further actions without being tracked. Criminals have also used ransomware to cause chaos and avoid detection after hacking into a network and stealing data. Ransomware attacks are sometimes used to create a diversion while cybercriminals steal or exfiltrate data. While users and IT teams are busy trying to take machines offline and contain the infection, criminals are busy downloading files…

Continue reading

Public clouds have been greatly promoted as an approach for organizations to reduce information technology (IT) costs and increase technology flexibility and scalability.  Cloud computing allows smaller organizations to employ IT services that would previously have been too expensive to implement due to high up-front infrastructure costs.  Companies can implement IT solutions faster in a public cloud because they do not have to spend time creating and configuring the technology environment.   Larger organizations, already familiar with remote computing operations, gain flexibility and scalability by utilizing cloud services or implementing private…

Continue reading

Virtualization has really become a mainstream technology and an effective way for organizations to reduce costs. As mentioned in previous articles, it simplifies processes but also creates new information security risks to handle. This article is concerned with business continuity and how virtualization can create many new opportunities and efficiencies in your business continuity plan. This is the third article in a series on virtualization. Specifically, three elements of business continuity that can be enhanced through virtualization. These elements are hot, warm, and cold sites, snapshots, and testing. If you have…

Continue reading