Do you have a disaster recovery plan for ransomware? I mean, do you really have a plan? Could you tell me what it is in a paragraph if you had to? Could you lay out what happens in a step-by-
One of the best ways to protect yourself against ransomware is through role playing. If you’re thinking Dungeons and Dragons right now, you’re actually on the right path—a ransomware ta
Many admins wonder how susceptible Linux is to the scourge of ransomware. There’s a general belief—which is correct—that Linux is more secure by default than Windows. That leads to the
Sponsored Post: Nick Lowe, CrowdStrike Director, Falcon OverWatch. Organizations of every vertical, size, and location can be targeted with a ransomware attack. Here’s what y
An .rrcc file is a computer file that’s been encrypted by ransomware criminals. It’s a variant of the STOP/DJVU ransomware, and although a newer entrant into the ransomware game, it’s q
Endpoint detection and response (EDR) capability is widely touted as an essential part of defense against ransomware. Unfortunately, it doesn’t always work as well as planned. Instead of sc
When 2017’s WannaCry ransomware attacks made mainstream headline news, it might have seemed like ransomware was a problem mainly for organizations behind in their patching. However, the
Even by its own grim standards, the last two years have been a remarkable time for the ransomware industry. Incidents have become ever more spectacular, while the ransoms being demanded have
Earlier this year, the FBI released data which was interpreted by many in the tech press as saying phishing attacks were significantly more costly to organizations than ransomware. This concl