Sponsored Post: Nasuni The greater the leverage, the greater the chance a ransomware attack will prove successful. An attacker gains leverage in two ways. The first is reach. The more operational services that can be disrupted, the more power. The second is financial risk. Every minute that a company is down represents a minute of […]
Sponsored Post: Nasuni Ransomware is a term that strikes fear in the minds of many CIOs and Technology Directors. While not a death sentence, it can certainly seem so as downtime turns from minutes, into hours or even days. During that time, operations grind to a complete stop or at least slow down as digital […]
I love to use analogies, so when I was asked to put together an article comparing honeypots vs. honeynets, I immediately thought of the word “fish.” Fish is an interesting word, in that it can denote a single fish: “I caught a fish this morning,” or multiple ones: “I caught almost a dozen fish yesterday.” […]
While we still refer to them as ransomware attacks, such incidents are no longer just about encrypting the files of a targeted victim. Ransomware attacks today are about gaining leverage on someone using whatever means necessary to get paid. The principle of a double extortion strategy is simple. If the first extortion approach isn’t producing […]
In the past decade we have seen cybersecurity companies releasing new products under the category of “deception technology.” For industry veterans, these solutions sound a lot like honeypots. Honeypots are in fact an early form of deception technology, back before there was a category name for it. Honeypots and deception technology appliances share the same […]
There has been a lot of media attention concerning the recent Microsoft Exchange server vulnerabilities that cybercriminals are exploiting to execute their malicious ransomware attacks. As a result, many organizations still holding on to their on-premises email infrastructure environments are considering migrating to Microsoft 365 (formerly known as Office 365) to lessen their risk exposure. […]