Email is the No.1 threat vector and most cyber-attacks including ransomware occur because of an action carried out by the recipient of an email. So, do you trust your inbox? The following tips are designed to help you investigate an email and avoid falling victim to a ransomware or other cyber-attack.
The world most valuable resource is no longer oil, but data. So what happens when this most valuable of assets is compromised or stolen? Would you pay to get it back or prevent its release to the wilds of the internet? Recent data suggests that 70% of enterprise ransomware attacks result in the criminals successfully eliciting payment from their victims.
Share on facebook Share on twitter Share on linkedin Brute Force Ransomware Attacks are on the Increase: A Strong Password Policy is your Best Defence Recent research by leading cybersecurity firms such as SonicWall, McAfee and F-Secure has found that brute force attacks are now the preferred means of spreading ransomware however, phishing emails remain
“It won’t happen to me”. Believe me, it probably will, so don't be a target. We're all at risk, no matter how vigilant we are, however the more vigilant you are the less likely you are to fall victim to a cyber-attack. The stakes are high, and you have a responsibility to protect your company’s
SonicWall Capture Labs are reporting that a new variant of the FILESLOCKER ransomware is actively spreading. FilesL0cker RAN$OMWARE (aslo known as FilesLocker) is a ransomware that encrypts files on your computer, effectively locking you out. As with all ransomware the cybercriminals will demand a ransom, payable in bitcoin, to allow you access your own files.
Unfortunately the scammers aren't going away and I think it's fair to say that this is going to get worse before it gets better and that's if it gets better at all. The fact is that despite the efforts of the many security companies to stay ahead of the cyber-criminals, it can be extremely difficult to stop
The greatest threat to your organisation is sitting in the inboxes of your employees. Email is still the number one threat vector and a major weak link in your IT security. The truth of the matter is that many of us have become complacent and just want to get through the many emails that
I would love to be spending my time writing positive pieces about IT and the world of technology and believe me, there are many positive stories I could write. Unfortunately in the fast paced cyber world we find ourselves operating in, I am increasingly finding it necessary to forewarn our clients and friends on
With the ongoing threat from cybercriminals using both high and low tech methods of identity theft, your data is your most prized possession. Like it or not you are no longer a person with a single identity. As we rely more and more on digital means to make our professional and personal lives more
In the final part in this series on cybercrime, I will highlight some other forms of cybercrime that you should be aware of and that have the potential to negatively impact your business operations. I will then finish off by summarising what has been covered throughout the series in a section titled "lessons learned" Other