In a joint cybersecurity advisory, several US government agencies warned that ransomware attacks on schools would likely increase in September. This might have been slightly more helpful if the advice came before the massive attack on the Los Angeles Unified School District (LAUSD), not after. Oops. But it’s not likely to surprise anyone that schools […]
We’ve explored what you can do to try to reduce the risk of a ransomware attack in your VMware environment, but sometimes despite our best efforts environments are still compromised. Let’s explore what you can do to get ahead of things and protect your environment so you can recover after an attack. There are two things […]
How do today’s ransomware attackers find a way in? In truth, there are numerous routes, some more obvious than others. The key for ransomware attackers is to find an initial staging post. Often this is an employee—or more specifically, the employee’s network credentials—grabbed after a phishing attack. In other cases, it’s about finding an external […]
I previously explained how zero trust’s objectives and principles can prepare you for a ransomware attack. Let’s now talk about actual implementation via microsegmentation. What Microsegmentation Is, and Isn’t Microsegmentation is all about breaking your network into segments. Don’t confuse it with the old network segmentation; we’re not talking about firewalls with rules built around […]
In early August 2022, the McAfee Mobile Research team identified a new virus, called HiddenAds, making its way through the Google Play store. According to the McAfee researchers, this virus has already affected more than one million users, a number expected to increase in the coming weeks. How Does HiddenAds Work? Attackers, taking advantage of […]
On Sept. 6, two Utah-based newspapers reported that their company files had been encrypted and rendered inaccessible, delaying the publishing presses for 24 hours. Days earlier, something similar happened at Savannah College of Art and Design (SCAD) in Georgia, this time leading to a breach of sensitive student and staff data. In California, it was […]
A REVEALING REPORT FOR IT PROFESSIONALS BY IT PROFESSIONALS