ransomware

Let’s Take A Look At Some Recent Cryptocurrency Scams

Although Bitcoin price dropped substantially this month, cryptocurrencies still attract myriads of swindlers like honey attracts bees. As new waves of users rush into crypto, there will certainly be scammers waiting for them.

Ransomware Always Tips Its Hand

Ransomware creates turmoil every day – for individuals and for enterprises. But there is encouraging news. Ransomware, by its very nature, tips its hand with characteristics that make it predictable and recognizable. These distinct features enable advanced security tools to detect and defeat ransomware before files are frozen and ransoms demanded.

Seriously?! Can You Not Do That? Chapter V - Careless/Misuse of Corporate Email

Every company uses e-mail to communicate, but few understand that this type of unstructured data needs to be protected. Considering that over 90% of attacks start with e-mail yet only 43% of IT professionals see projects involving unstructured data as a top priority, it’s not surprising that these attacks can cause significant financial damage. Here’s how companies can safeguard against this risk.

Blockchain Technology For Better Cybersecurity?

Blockchain technology offers a more secure and reliable way of improving cybersecurity in organizations. This article discusses how blockchain-enhanced cybersecurity can help protect organizations from ransomware attacks like WannaCry and Petya.

A Cyber-Attack Costs A Lot More Than You Think

When it comes to thinking about cyber-attacks, many of the folks running businesses are relying on a heavy combination of faith ("it won't happen to us"), reliance on cyber-insurance ("any losses will be covered"), and the unfounded belief that the long-term consequences won't be that bad ("if it does happen, we'll be back in business in no time"). Alas, every single one of those ideas is simply wrong.

Current Cyber Coverage Cannot Stand the Next WannaCry

Insurance expert Bill Kelly of Argo Pro provides his insights on the WannaCry ransomware cyber attack and how companies of all sizes can work with insurance providers to find appropriate coverage in order to best protect themselves ahead of the next big cyber attack.

IoT Pose A Threat To Anything And Everyone Connected

When it comes to the Internet of Things, it’s easy to identify the breadth and depth of the potential value of these connected things. It’s not so easy identifying the threats, risks, and related management solutions. Expert Chuck Brooks gives us his view into how to get a handle on these challenges.

The Far-Reaching Effects of a Malware Attack

When a company suffers a malware attack, the effects are widespread. Just how far, you ask? To help answer this question, expert Brian Laing explores this topic both far and wide.

How To Streamline The Cybersecurity Insurance Process

Is cybersecurity insurance a necessary evil? Assuming it is, how can organizations make the most of their audit and compliance efforts to get the best coverage and rates possible? Expert Alan Zeichick speaks with experts from multiple angles to see how best to streamline the application process.

Cybercriminals Make a Lot of Money. Because it is Too Easy

A new Kaspersky report shows criminals are enjoying profit margins of up to 95% on some DDoS attacks. Attackers are also demanding a ransom from a target in return for not launching a DDoS attack, or calling off an ongoing attack. Ben Herzberg from Imperva tells us why you need to pay attention to these stats.

The 5 Best Defenses Against Ransomware Are Aggressive Offenses

The best defense against growing waves of more intelligent ransomware is an aggressive offense. To ensure that your enterprise is ready, consider these five tips offered up to us by Kyle Bubp.

Cyber Threats Have Evolved. How About Your Insurance?

Great advancements have been made in cyber risk insurance since the first policies were introduced nearly two decades ago. Options available in 2017 offer organizations the ability to not only survive a data breach but the resources and finances to swiftly take it head on and win. Cyber threats have evolved but has your approach to insurance?

Your Personal CyberSecurity Needs You. Learn How To Enhance Your iPhone Security

What are some easy ways to enhance your iPhone security? Readers will learn how to protect their iPhones and the sensitive information that can be stored on these devices.

A Dialogue with Dinah Davis - Founder of Code Like a Girl

The founder of “Code Like A Girl” explains the overt sexism she experienced growing up, later in college and in the corporate world merely due to her gender, which made her only more determined to make strides for women who are interested in a tech-oriented career.

Curiosity Didn’t Get the Best of Him; It Led to a Career

An IT security professional realizes that his life’s mission to protect information harks back to being a curious youngster who absconded his teacher’s log-in credentials and then poked around the school’s rudimentary computer network. Little did he know, a rewarding career lay ahead.

Happy Ransomware Year, MongoDB!

Malicious actors are wasting no time in kicking off 2017…in the past week we’ve seen an active and growing ransom campaign against over 10,000 unsecured Internet-facing data MongoDB instances. Here expert Jason Garbis explores this situation a bit more, and then takes a step back for some analysis.

Good Bots, Bad Bots, and Humans. Can You Tell Who Is Who?

Good Bots. Bad Bots. Can you tell those apart from the ‘normal’ traffic generated by the humans using your network? Sean Martin works with the team at Distil Networks to identify 10 ways to spot bad bots on your network?

How Law Firms Can Guard Critical Information from Cyber Attacks

Movement of data to cloud-based case management, record searching, research, and platforms introduces risk. Legal firms, no matter the size, must see the importance of protecting the sensitive case information of their clients, especially for ongoing cases, against those who wish to threaten their cybersecurity.