Ransomware continues to be a headline grabber but where do these attacks rate compared to other cyberattacks? We look at the history of ransomware, its not-so-obvious impacts, and how you can prepare for the next attack in this special report. Download here. … [Read more...] about A king’s ransom(ware)
Features
Ransomware: A no-win scenario
Ransomware is a vicious type of malware. Not only can it potentially destroy your data and perhaps even your hardware, it can wreak havoc on your business operations. Ultimately the question a company has to face, of course, is do you pay the ransom for the chance to recover your system or not. If you don’t pay, you potentially could lose everything. If you do pay, you … [Read more...] about Ransomware: A no-win scenario
Cutting off phish heads
Phishing is more than just an inconvenient, low-level attack; it potentially could have devastating impact on a company. It is essential to understand why and how it happens in order to determine where the attack might have migrated in the system and what data it is after. Understanding the modus operandi of the attack is essential to know how to defend against it. Such … [Read more...] about Cutting off phish heads
Phishing reference guide
We hear a lot of talk about phishing and how that is a prime attack vector for malware and ransomware attacks. It’s also a great vector for social engineering and CEO Fraud. With all the anecdotal recommendations on how to defend against phishing, sometimes it can be difficult to separate proven strategies of phishing defenses from unconfirmed reports of how somebody, somewhere … [Read more...] about Phishing reference guide
Phighting phishing
Defending against one of the most common cyberattacks is sort of like Whack-a-Mole on steroids. A variety of statistics are available from cybersecurity and non-cybersecurity firms about spam, phishing and malware. It really doesn’t matter which vendor’s numbers you look at; everyone will tell you that more than half of all email sent is at best is just spam and at the worst, … [Read more...] about Phighting phishing