An essential element in being prepared to respond to cyber attacks, and ransomware attacks in particular, is to close the biggest and most easily breached hole in an any organization’s firewall —well-intentioned internal users who fall victim to phishing attacks. Phishing attacks work by tricking users into clicking links or opening email attachments that install […]
In Part One of my series on ransomware tabletops, a company was caught unprepared when hit with a real ransomware attack. Fortunately for them, their tape backups weren’t affected by the attack, and they lost less than a day’s worth of data. Who Do We Fire? The new CTO wanted to know who was to […]
It’s common for companies to discover too late that it’s not a matter of “if” but “when” they’ll be hit by a malware attack. It’s also too common for companies to find themselves unprepared when it does happen. But how do you prepare for a worst case scenario? An All-Too-Real Ransomware Attack On Monday morning, […]
A REVEALING REPORT FOR IT PROFESSIONALS BY IT PROFESSIONALS