Sponsored Post: Nick Hayes, CrowdStrike Senior Product Marketing Manager. We’ve all seen the devastating impact adversaries and ransomware attacks can have on organizations—taking down critical systems and operations, holding strategic data and intellectual property (IP) hostage, and straining relationships with key partners, investors and customers. These attacks are becoming increasingly common along with the repercussions: […]
ActualTech Media moderators David Davis and Scott Bekker had an interesting discussion recently about phishing attacks and how prevalent they remain. This has special relevance to ransomware, as so many ransomware incidents start as phishing attacks. Some of the highlights of their chat include: It’s worth checking out this quick discussion, which served to introduce […]
Ransomware is a growing threat for everyone, that much is clear. End it affects every major operating system (OS), but not all of them equally. So, which OS is safer – Windows or Linux? Though Windows is the juicier target given its end-user market dominance, and Linux has long laid claim to superior security, the […]
Ransomware attacks have continued to plague organizations over the past few years, especially with the move to big game hunting at the end of 2019, and the debut of “double extortion” in 2020. Initially, threat actors primarily targeted Windows-based environments, but have more recently expanded capabilities to include Linux-based systems. In 2021, well-known groups including […]
According to the US Justice Department, more than 4,000 ransomware attacks happen daily, on average, in the US alone. Most of them don’t make the news. Many attacks are quietly paid off, and the businesses who fall victim often keep it under wraps. Cyber-criminals are counting on that, as they want victims to pay up […]
To make a rational risk assessment about any scenario, you need to know what the possible outcomes are, and the consequences of each outcome. The alternative to proactive investment is reactive crisis response, which most frequently manifests in the form of this question when it comes to ransomware: “Do we pay the ransom or not”? […]
A REVEALING REPORT FOR IT PROFESSIONALS BY IT PROFESSIONALS