The Definitive Ransomware Protection Guide for Business in 2020
Prepare - Survive - Recover
An abandoned office will present some unique risks to your I.T. infrastructure, your backups included. Here are some ways you can prepare for an office lockdown, so you remain cyber-resilient while the office is empty.
Amidst the Covid-19 public health emergency, here’s a summary of the latest updates pertaining our team and how we continue to support your business.
The best time to protect yourself from ransomware is before it strikes. Cyber-resilience requires the right ransomware protection to save you from the panic and stress of unplanned downtime and potentially hundreds of thousands of dollars in ransom payments.
Amidst the Covid-19 public health emergency, here’s a summary of the latest updates pertaining our team and how we continue to support your business.
The best time to protect yourself from ransomware is before it strikes. Cyber-resilience requires the right ransomware protection to save you from the panic and stress of unplanned downtime and potentially hundreds of thousands of dollars in ransom payments.
Interest

Virus Injected Into DNA and Used to Hack a Computer

Researchers have successfully proven that viruses can be weaponized to infect computers and take them over. And if that’s not the premise of a dystopian sci-fi novel, I don’t know what is. The University of Washington recently baked malware into a genetic molecule and then infected a system analyzing it. If it sounds like DNA data

Interest

Why WCry Marks a World Turning Point

I’m going to say something controversial, so brace yourself—the WCry ransomware was a good thing. Now make no mistake about it. Ransomware is evil. It’s used to literally hold people’s lives hostage. Just like a tornado, it destroys businesses and lives. But it’s far worse, because people make ransomware…and knowing what it does, deliberately inflict it upon

Stegano invisible
Interest

Invisible Malware Can Now Hide In Banner Pixels with “Stegano”

Over the last two months, millions of visitors to mainstream websites have been exposed to a new form of malware embedded in banner pixels. And if you didn’t see it, don’t be surprised. The new malware, “Stegano”, is nearly invisible to the naked eye. Its code has been embedded in parameters controlling the transparency of

Interest

Amazing Phishing Attempt: A Must See!

This spam e-mail is so well crafted, it’s both incredible and horrifying. Would your users know this was spam, or would they think it was real?

Interest

Does Counter-Phishing Work? Half of People Click Whatever They Are Sent

You know the feeling. A user has done something incredibly dumb. Like opening a strange attachment despite all the counter-phishing training you did last month. And your brain cells all scream at once, just one single word. “Whhhyyyyyyyy?” It’s said that common sense isn’t common. When it comes to IT, it’s even more true. A

Interest

Don’t plug it in! Malware-infected USB sticks in your Mailbox

It’s like the tale of Pandora’s box. Infected USB sticks are finding their way into people’s mailboxes—and curiosity is making them look inside. The Australian Police Force is being flooded with phone calls from residents of the Melbourne suburb of Pakenham. Upon connecting the infected USB sticks to thier computers, they’ve been assailed with extremely

tailoring your backup scenarios to security threats
Interest

Tailoring Backup Practices to Common Security Threats

As an IT professional in 2016, security is a big concern. That’s why infosec is becoming a larger and larger part of IT budgets around the world as each year passes. But what you may not be aware of is the vital role that backups can play in protecting against or recovering from some of

Interest

Spear phishing is on the rise – know how to spot it!

Spear Phishing has been on the rise lately, according to a number of recent posts by IT Professionals on Spiceworks. These kinds of targeted attacks can be extremely harmful to businesses if staff aren’t properly prepared, so in this article, we’re going to look at what Spear Phishing is, how your business can defend against it,