Because Microsoft Exchange is so often targeted by ransomware gangs and other malicious organizations, it’s critical to do everything possible to secure your Exchange environment. And for o
One of the biggest internal debates facing ransomware recovery planners is whether to pay an extortion demand or fall back on a process of internal data recovery. Increasingly, however, victi
A critical and often underestimated resource in the fight against malware is the industry’s history of finding and reporting software flaws in everything from big-brand programs to websites
There is a definite cool factor concerning the use of honeypots to hunt down an elusive hacker. Deploying a honeypot or two across your network is like creating a spy network within your orga
Ransomware targeting VMware hosts is rapidly on the rise, and Black Basta is one of the latest jumping on the bandwagon. Like most ransomware, this relative newcomer first targeted Windows sy
Sponsored Post: Paul Ashwood, CrowdStrike Senior Product Marketing Manager, Incident Response When a breach occurs, time is of the essence. The decisions you make on who to partner with and h
We’ve all heard the adage “You can catch more flies with honey than vinegar.” The phrase dates back to 1666, where it appeared as an Italian proverb. However, the principle remains true
I’m a private pilot (although dormant), and used to own my own little plane. It was a fun hobby, until I moved, my mortgage doubled, and I decided I couldn’t afford to own a plane anymore
For most of us, the chance of being caught up in a data breach is just another hazard of online life. Personally identifiable information (PII) is stolen from a company we have an association