Sponsored Post: Narendran Vaideeswaran, CrowdStrike Director, Product Marketing, Zero Trust.Ransomware is a dangerous and evolving threat to organizations of every size, industry and geography. As ransomware operators and affiliates refine and evolve their strategies, security teams must ensure they have the strongest, most proactive protections in place to defend against this threat. This year’s Verizon Data […]
Do you have a disaster recovery plan for ransomware? I mean, do you really have a plan? Could you tell me what it is in a paragraph if you had to? Could you lay out what happens in a step-by-step sequence in case of attack?Most people can’t answer all these questions with a “Yes.” That’s […]
One of the best ways to protect yourself against ransomware is through role playing. If you’re thinking Dungeons and Dragons right now, you’re actually on the right path—a ransomware tabletop exercise is essentially the cybersecurity version of that.We’ve posted a log of essential information around this topic, and present it here as a quick primer […]
Many admins wonder how susceptible Linux is to the scourge of ransomware. There’s a general belief—which is correct—that Linux is more secure by default than Windows. That leads to the incorrect belief among some that Linux systems are mostly invulnerable to ransomware. In fact, Linux ransomware is real, it's very dangerous, and it’s growing.We’ve published […]
Sponsored Post: Nick Lowe, CrowdStrike Director, Falcon OverWatch.Organizations of every vertical, size, and location can be targeted with a ransomware attack. Here’s what you need to know about how these threats are evolving.Ransomware activity continues to grow and evolve each year, putting all organizations at heightened risk of an attack. Security teams, the protectors of the enterprise, must […]
An .rrcc file is a computer file that’s been encrypted by ransomware criminals. It’s a variant of the STOP/DJVU ransomware, and although a newer entrant into the ransomware game, it’s quickly rocketed to prominence.An .rrcc file appends standard computer files with “.rrcc,” so a Word file called “list.docx” would be renamed “list.docx.rrcc” by the ransomware […]