Category:

Ransomware

What is Ryuk Ransomware and How Does it Work?

Ryuk is a type of ransomware that encrypts files on an infected system, with ransom typically demanded in bitcoin or other types of cryptocurrency. Ryuk has targeted many large organizations using Microsoft Windows and related systems. First spotted in August 2018, it was initially thought to be a group that operates out of North Korea, but now is believed to…
Read article

Pro Tips: Protecting Against Phishing and Ransomware

Many small and medium businesses (SMBs) who allowed employees to work remotely for the first time in 2020 have decided to continue to support remote work indefinitely, at least for some employees who prefer it and have proven they can work productively in that mode. Even those businesses who summon most employees back to the office now operate in a…
Read article

What is Maze Ransomware and How Does it Work?

Maze Ransomware has been in the headlines non-stop ever since it was first reported in May 2019, when its authors used “Missed package delivery” and “Your AT&T wireless bill is ready to view” emails to trick recipients into opening messages with malicious payloads. Maze has been used to attack individual companies, governments, and increasingly – and perhaps most worryingly –…
Read article

What is the Cost of a Data Breach?

Data breaches are on the rise—both in the United States and throughout the rest of the world. A simple lapse in cybersecurity can jeopardize precious information and have a detrimental impact on the safety of your organization. Why Cybersecurity Is More Important Than Ever Curious to learn more about the true cost of a data breach? We dissected the latest…
Read article

Salami Attacks: What Are They and How Can They Be Prevented?

Salami attacks have been on the rise in recent weeks—targeting banks and financial institutions across the United States. But how does a prevalent form of cyberattack relate to a delicious type of red meat? Here’s the latest on what you need to know about salami attacks. Cybersecurity Advisory: Top Exploited Vulnerabilities To Be Aware Of What is a salami attack?…
Read article

How to Recognize and Avoid Phishing Scams

By Michael Hensley, Director of Professional Services As cyberattacks have become increasingly prevalent in recent years, the importance of effective cybersecurity preparation has grown exponentially. To safeguard assets and protect against hacking attempts, organizations have felt the pressing need to ramp-up their security measures by mandating appropriate training exercises and informational sessions for all employees. Despite recent technological innovations that…
Read article

Video: How to Solve Cybersecurity Challenges During COVID-19

As the COVID-19 crisis continues to evolve, we are making every effort to help your business stay safe from cyberthreats and other IT challenges. We teamed up with our trusted partners at Cyberstone to put together this informational video, which covers: Hacking campaigns and phishing attacks Trickbot banking trojans Tips from the National Cyber Security Center Virtual Private Networks (VPN)…
Read article

RaaS, ‘Ransomware As a Service’ | Cybercrime Rising

Just a few years ago you may not have even heard the term ransomware. Today the word is littered throughout just about every IT message, preaching the importance of cybersecurity. It’s true. Cybercrime is certainly on the rise, and more and more criminals are joining the party. According to Sophos Research, over 50% of organizations were struck by ransomware last…
Read article