Three Phases of a Ransomware Attack
When you’re looking for a way to defend your company against a threat, it helps to break the threat down into smaller parts. Where does it come from and how do we stop it? How does it spread and how […]
When you’re looking for a way to defend your company against a threat, it helps to break the threat down into smaller parts. Where does it come from and how do we stop it? How does it spread and how […]
The current state of AV testing is sort of the cybersecurity version of standardized testing in schools. It’s a pet peeve of mine when schools “teach the test”–focusing on ensuring students perform adequately on standardized tests rather than making sure
Cylance Controversy Illustrates What’s Wrong with AV Testing Read More »
In the last few years we have seen several high-profile Distributed Denial of Service (DDoS) attacks against political and financial targets. Many of us remember the attack against Occupy Central in 2014 and the attack against the Church of Scientology
Threat actors are always looking for new ways to infect as many users as possible with their malicious payloads. As a means to this end, these threat actors get creative with the types of files they use to deliver their
Cyberspace has become an increasingly attractive hunting ground for criminals, activists and terrorists. The technical capabilities and influence of cybercriminals are now equal to those of many governments and organizations. In the next few years, these capabilities will extend far
One of the interesting announcements this week was Watson For Cybersecurity. While it has been rumored that Watson has been tied to DOD and Intelligence efforts for some time this is the first time we’ve seen Watson’s powerful AI engine
The Power Of Watson For Cybersecurity: This AI Will Keep You Safe Read More »
Over the past several years, executives at popular antivirus software companies have said in public and on the record that antivirus software is dead. Those statements lead the public to believe that this type of digital security is worthless. However,
What Security Threats Put the Digital Economy at Risk? Read More »
If your organization uses Office 365, Barracuda has a new tool you need to check out. Barracuda Email Threat Scan for Office 365 performs a non-intrusive scan of inboxes, sent mail, junk mail and deleted folders to identify any hidden
Find Out What Threats Are Lurking in Your Office 365 Email Read More »
As technology becomes increasingly integrated into the business sphere, companies are looking to bolster their security and defend their network from a potential breach. According to the FBI, cybercriminals stole $209 million in the first three months of 2016, and
Top Ways Businesses Can Protect Themselves against Ransomware Read More »
Ransomware is everywhere on the news these days because it’s such a successful attack strategy: offshore hackers encrypt your data and demand a ransom for its return. Formerly relegated to home users and small sub-$1000 payouts, the criminals are moving
Ransomware- Either Deny It Exists or Prevent It from Infecting You Read More »