Blog

Less Than Half of Ransomware Victims Recover Their Data After Paying the Ransom Demand

Posted on

A ransomware attack can happen quickly and paralyze a business or company within minutes. Most of the time, these attacks are followed by a ransom note or list of demands from hackers. Many ransomware victims will feel that they must pay the ransom to regain access to their data, but new data shows that may not be the best strategy.  Unfortunately, a survey released this … Continue reading “Less Than Half of Ransomware Victims Recover Their Data After Paying the Ransom Demand”

Atlanta’s Computer Systems Infected with Ransomware, Hackers are Demanding Over $50,000 in Bitcoin

Posted on

The city of Atlanta is reeling due to its computer systems being hacked by ransomware last week, and many city departments are still offline. The hackers responsible for the attack are demanding a ransom of $51,000 worth of Bitcoin. This type of brazen cyberattack by hackers shows just how confident cybercriminals are becoming. An Early … Continue reading “Atlanta’s Computer Systems Infected with Ransomware, Hackers are Demanding Over $50,000 in Bitcoin”

A Fake IRS Email Scam is Spreading a New Form of Ransomware

Posted on

Have you received a suspicious email from the IRS recently? It could be a trick to infect your computer with ransomware. Hackers are constantly looking for new ways to fool victims, and a new campaign is using fake emails from the Internal Revenue Service. These fake emails are spreading a new form of Ransomware, called … Continue reading “A Fake IRS Email Scam is Spreading a New Form of Ransomware”

Hackers are Using Malware to Generate Cryptocurrencies

Posted on

Cryptocurrencies enjoyed an incredible 2017 and are still unbelievably popular in 2018. Ever since Bitcoin’s price skyrocketed throughout last year, cryptocurrencies have been a hot topic for news organizations and financial institutions alike. Some believe Bitcoin and other cryptocurrencies such as Ethereum, Litecoin, and Monero are the currency of the future, while others believe they … Continue reading “Hackers are Using Malware to Generate Cryptocurrencies”

Spectre and Meltdown Vulnerabilities: What Happened and How to Secure Your Computers

Posted on

Just as the calendar turned to 2018, the IT security world was turned on its head when two major security flaws in virtually all modern computers were disclosed to the public. The two vulnerabilities, Spectre and Meltdown, are flaws in modern processors that allow hackers to steal information from the memory of computer programs. These … Continue reading “Spectre and Meltdown Vulnerabilities: What Happened and How to Secure Your Computers”

Insider Threats – Your Organization’s Top Security Risk

Posted on

An insider threat is just what it sounds like. Any time an organization’s security is threatened from an employee or third party within, data and profitability are at risk. Vulnerability management helps analyze risk. Threats can be malicious when insiders intentionally cause leaks and data breaches to seek revenge or obtain money. Occasionally, hackers from … Continue reading “Insider Threats – Your Organization’s Top Security Risk”

Battling Ransomware: 3 Tips for Health Care Organizations

Posted on

Ransomware poses a very real threat to every health care organization in America. In the health care industry, 85% of organizations have experienced a ransomware attack, and that number continues to climb as criminals recognize the unique vulnerabilities in the health care industry. Motivated by patient safety, the potential damage to the reputation of their … Continue reading “Battling Ransomware: 3 Tips for Health Care Organizations”

Protecting Patient Information from Ransomware

Posted on

The health care industry was the target in 88% of all ransomware attacks on US industries in 2016. The perpetrators of these malicious attacks have realized that the health care industry is particularly vulnerable to cyberattacks and has a major incentive to pay the ransom quickly. Patient safety, the organization’s reputation, and the risk of … Continue reading “Protecting Patient Information from Ransomware”

How to Reduce Your Law Firm’s Cyber Risk

Posted on

Experts agree that cybersecurity threats present significant risks to businesses, including law firms. Clients place a great deal of trust in law firms, which have a clear duty to protect their clients’ sensitive information. While bigger targets exist, hackers have begun targeting law firms because they found them to be the weakest link. Law firms … Continue reading “How to Reduce Your Law Firm’s Cyber Risk”