Blog

03 May, 2022

5 Titles for Your Ransomware Bookshelf

It’s not giving away any trade secrets to state that the more you know about a subject, the better equipped you’ll be to handle what comes your way. This especially applies to urgent issu
Cary Kostka
02 May, 2022

Virtualizing Your Backup System Makes it Vulnerable to Ransomware

Imagine you’re the enterprise admin for your company and your CIO has just informed you that a new application server is needed for the HR department. So, what do you do? Create a new v
Brad Rudisail
29 April, 2022

5 Steps to Ransomware-Proof your Backup Systems

When formulating a strategy to protect your enterprise against ransomware, it’s critical to shore up your backup system defenses. Backups don’t often get the respect they deserve, yet the
Brad Rudisail
27 April, 2022

Government Is Top Target for Ransomware

The numbers are in, and they’re clear: if you work for the government, you’d better be wary, because you’re the No. 1 target for ransomware thieves. That’s according to data from Stat
Keith Ward
25 April, 2022

Ransomware Calculus: Little Risk, Huge Reward

 Why does ransomware remain stubbornly popular? One reason is incredibly obvious, and you’ve no doubt thought of it already. Another reason is more subtle, but no less important.That’s t
Keith Ward
22 April, 2022

5 Ransomware Myths

The ransomware headlines in 2022 revolve around the surge in ransomware attacks. Of course, those were the headlines in 2021, 2020, 2019, and so on. Don’t misunderstand—those headlines we
Allan Liska
21 April, 2022

Why Backups Remain the Key to Ransomware Recovery

Let’s say you report to work today and find out that all your critical data repositories have been encrypted by a ransomware attack. A hefty ransomware note is prominently displayed on all
Brad Rudisail
20 April, 2022

Ransomware Criminals Sat Undetected Inside a U.S. Government Network for Months

If there’s one thing that’s worse than being compromised by ransomware, it’s realizing that the hack that led to the ransomware compromise happened months earlier without being spotted.
John E. Dunn
19 April, 2022

The Many Methods of Ransomware Infection

Not only is there a growing rogue’s gallery of ransomware variants, but the tricks they use to strike a victim are growing in variety as well. Malicious URLs Tricking a victim to click a ma
James Panetti
1 21 22 23 24 25 33
Share via
Copy link
Powered by Social Snap