Blog

19 September, 2022

Back to School Season Means Ransomware Attacks on Education

In a joint cybersecurity advisory, several US government agencies warned that ransomware attacks on schools would likely increase in September. This might have been slightly more helpful if t
Katherine Gorham
16 September, 2022

Protecting Your Virtual Machine Content from Ransomware

We’ve explored what you can do to try to reduce the risk of a ransomware attack in your VMware environment, but sometimes despite our best efforts environments are still compromised. Let’
Melissa Palmer
15 September, 2022

The Humble VoIP Phone System Is Now a Big Ransomware Target

How do today’s ransomware attackers find a way in? In truth, there are numerous routes, some more obvious than others. The key for ransomware attackers is to find an initial staging post. O
John E. Dunn
14 September, 2022

Microsegmentation: Trapping Ransomware Before It Can Spread

I previously explained how zero trust’s objectives and principles can prepare you for a ransomware attack. Let’s now talk about actual implementation via microsegmentation. What Microsegm
James Panetti
13 September, 2022

Android Users Increasingly Targeted by Ransomware

In early August 2022, the McAfee Mobile Research team identified a new virus, called HiddenAds, making its way through the Google Play store. According to the McAfee researchers, this virus h
Cary Kostka
12 September, 2022

Transparency Is the Ransomware Defense More Organizations Should Embrace

On Sept. 6, two Utah-based newspapers reported that their company files had been encrypted and rendered inaccessible, delaying the publishing presses for 24 hours. Days earlier, something sim
John E. Dunn
02 September, 2022

How Are Honeynets Different from Honeypots?

I love to use analogies, so when I was asked to put together an article comparing honeypots vs. honeynets, I immediately thought of the word “fish.” Fish is an interesting word, in that i
Brad Rudisail
01 September, 2022

What the Hive Tells Us About the Future of Ransomware

Discerning trends in ransomware has never been easy, but every now and again something jumps out from the confusion of events that points clearly at trouble ahead. A good current example is t
John E. Dunn
31 August, 2022

The 3 Principles of ‘Zero Trust’

In my last post, I explained what the zero trust model is, its three core objectives, and how it can prepare you for even the most unpredictable ransomware attacks. Today, let’s explore the
James Panetti
1 12 13 14 15 16 33
Share via
Copy link
Powered by Social Snap