Need a new search?

If you didn't find what you were looking for, try a new search!

Ransomware Defense for Small Businesses – Are You Prepared?

Ransomware is a type of malicious software (malware) that locks down your files by encrypting or scrambling the information. This information can be unlocked with a key, and that key is sold to the victim as the ransom payment. However, there is no guarantee that you’ll get the key or unlock your files after paying. [...]

By |2019-06-04T18:24:58-05:00May 30th, 2019|Managed Services, Security Solutions|Comments Off on Ransomware Defense for Small Businesses – Are You Prepared?

Azure Backup and the Evolving Threat of Ransomware

Ransomware is still the most common cyber threat for organizations: thousands of ransomware attacks occur every day. In 2017, Malwarebytes saw an increase of 90% in ransomware detected in businesses. From the city of Atlanta’s operations being crippled by SamSam ransomware, to Boeing’s systems being hit by WannaCry, no one is safe from cyberattack. Even [...]

By |2018-12-18T12:06:57-05:00April 11th, 2018|Security Solutions|Comments Off on Azure Backup and the Evolving Threat of Ransomware

Reduce Ransomware by 70%

How can you accomplish this? It’s simple - Security Awareness training. Your employees are your frontline of defense against virtually all ransomware and malware. Effective Security Awareness training can reduce malicious activities by 70%.[i] It is just like teaching your employees a new job function - it’s a process. As employees learn, they will begin [...]

By |2019-04-23T10:45:20-05:00July 14th, 2017|Security Solutions|Comments Off on Reduce Ransomware by 70%

The Ransomware Saga Continues

We’ve written and talked extensively about the rising number of ransomware attacks. If you’ve missed any of that coverage, our multi-part ransomware blog series is a good primer. In lieu of a deep dive, let’s look at some quick facts: Attacks are expected to double in 2017i Ransomware can attack any type of computerii 70% [...]

By |2019-04-23T10:45:42-05:00June 7th, 2017|Security Solutions|Comments Off on The Ransomware Saga Continues

Ransomware + SIEM = Pre-detection

When companies are hit by ransomware, they are often caught off-guard. Many organizations believe that ransomware attacks are completely at random – with no warning signs. However, with the right tools in place, you can identify the foundation of an attack before the damage is done. The Stages of a Ransomware Attack Generally, there are [...]

By |2019-04-23T10:48:29-05:00May 17th, 2017|Security Solutions|Comments Off on Ransomware + SIEM = Pre-detection

How to Prepare your End Users to Fight Against Cyber Hackers – Ransomware Series Part 8

This may be hard to believe, but the majority of breaches that occur are not because there are so many super smart hackers out there taking the time to decipher your company’s weak passwords or open ports in your network. Breaches are likely caused by your end users - your employees. How can your organization combat [...]

By |2019-04-23T10:48:16-05:00April 3rd, 2017|Security Solutions|Comments Off on How to Prepare your End Users to Fight Against Cyber Hackers – Ransomware Series Part 8

Ransomware – Is there a Silver Bullet?

It seems like a week doesn’t go by that a client asks me what they need to do to stop ransomware.  I’ve even had one person ask if there is a silver bullet – 1 thing that their organization can do to protect themselves from any possible ransomware infections. Considering the devastating effects that ransomware [...]

By |2019-05-06T09:34:45-05:00March 27th, 2017|Security Solutions|Comments Off on Ransomware – Is there a Silver Bullet?

The Evolution Continues – Ransomware Series Part 7

Another malware has hit the market since our evolution blog in February. Not only is this ransomware impossible to decrypt, but the cyber hackers are putting a nice spin on it. This ransomware is called the Kirk Ransomware with a Spock decryptor. Why is this ransomware different? Well, not only is it Star Trek themed, but [...]

By |2019-04-23T10:48:05-05:00March 20th, 2017|Security Solutions|Comments Off on The Evolution Continues – Ransomware Series Part 7

What does a Cyber Hacker really want? – Ransomware Series Part 6

There are several things that Cyber Hackers really want with you and your environment. Sure they want to make money and exploit your data, but we're talking the granular things that Cyber Hackers want... So what is it, you ask? It's simple – they want 3 things… They want to find a way to get [...]

By |2019-04-23T10:47:54-05:00March 10th, 2017|Security Solutions|Comments Off on What does a Cyber Hacker really want? – Ransomware Series Part 6

The evolution is here. Are you worried yet? – Ransomware Series Part 5

The ransomware threat is a business - and what do businesses have to do to continue to remain in business? Develop new products or services to increase revenue. So what does that say for ransomware? That means it isn’t going away any time soon - any business or consumer needs to keep up with the [...]

By |2019-04-23T10:42:23-05:00March 1st, 2017|Security Solutions|Comments Off on The evolution is here. Are you worried yet? – Ransomware Series Part 5

Ransomware – Should I pay?

The “right” answer is no, you shouldn’t pay the ransom. This is similar to the stance the government takes when dealing with hostages. In principle, not paying ransom diffuses the whole process – the bad guys don’t get funded and the effort is for nothing. Does it ever make sense to pay the ransom? Consider this - [...]

By |2019-05-06T09:34:30-05:00February 22nd, 2017|Security Solutions|Comments Off on Ransomware – Should I pay?

Hackers Known Targets and Entry – Ransomware Series Part 4

People assume that hackers are specifically targeting their company’s data for something similar to WikiLeaks. This is not the focus for most hackers--the main reason they want access to your environment is to lock down your data and have you pay them ransom money. How do they get in your network in the first place? [...]

By |2019-04-23T10:47:30-05:00February 15th, 2017|Security Solutions|Comments Off on Hackers Known Targets and Entry – Ransomware Series Part 4

I’m infected with Ransomware. What do I do? – Ransomware Series Part 3

You’ve been infected with ransomware, you need to act quickly to save your data.  Disconnect from WiFi or unplug from the network immediately. You have to be off of the network so the infection does not spread to other machines or directories. Use System Restore or a backup solution to get back to a known-clean [...]

By |2019-04-23T10:47:03-05:00January 18th, 2017|Security Solutions|Comments Off on I’m infected with Ransomware. What do I do? – Ransomware Series Part 3

Ransomware is real, so why not start preventing it? – Ransomware Series Part 2

Ransomware can be time consuming, alarming, and, quite honestly, scary. Your files get stolen and held for ransom and, in the worst case, they can be deleted if you don’t pay up. There are some tools available to decrypt the Ransomware, but as mentioned in Part 1 of our Ransomware series, there are many Ransomware types out [...]

By |2019-04-23T10:46:33-05:00December 16th, 2016|Security Solutions|Comments Off on Ransomware is real, so why not start preventing it? – Ransomware Series Part 2

Ransomware: there isn’t just one kind to be concerned about – Ransomware Series Part 1

In this first installment of the Ransomware series we will look at the different types of attacks.  However, as quickly as we learn about existing methods of attack, cyber hackers are already preparing to change the way they attack. There are two distinct types of Ransomware--Locker Ransomware or Encrypting Ransomware.  Let’s review some terminology first before we start [...]

By |2019-04-23T10:46:24-05:00December 5th, 2016|Security Solutions|Comments Off on Ransomware: there isn’t just one kind to be concerned about – Ransomware Series Part 1