Cybersecurity & IT Insights
What Is a Perimeter Defense? How to Layer Security
The explosion of ransomware has many security experts arguing forcefully against a perimeter-only security model. These experts point out that this approach has led to cyberattacks that have caused billions of dollars of economic damage. But what is perimeter...
Double Extortion Attacks More Prevalent than Ever
Ransomware is still all over the place - attacks are up 62% globally and 158% in North America since 2019. But ransomware-only attacks have mostly been replaced by more sophisticated – and ruthless – attacks. In a traditional ransomware attack, a cyber criminal finds...
Ransomware News: Biggest Attack Ever
Ransomware News: Early July had several cybersecurity events with big impacts on small and mid-sized businesses. Here are three you that should know about. REvil’s Kaseya Attack Hits Thousands of Businesses Worldwide, US Will Respond The biggest news story this week...
7 Types of Malware
The ever-changing IT environment has made it easier for malware to exist and thrive. In today's world, businesses and individuals alike are constantly bombarded with new threats, making it more important than ever to be aware of the latest malware trends. Types Of...
On-Site Backups Wiped Remotely, Malware Call Centers, and a New Federal Data Breach Bill
Congress continues to crawl towards new legislation to contain cybersecurity damage. Meanwhile, traditional antivirus techniques now miss most attacks, and Western Digital customers wake up to empty backup drives. Signature-Based Anti-Malware Tools Now Miss Most...
What Is Doxing? And What Does It Have to Do With Cybersecurity?
It sounds bad. It is bad. But what is it? Doxing Doxing is shorthand for “dropping dox” (documents), a phrase invented by hackers in the 90s. Dropping dox means to publish embarrassing or incriminating documents about a person or company online. It’s normally done...
Who Pays All of These Ransoms, Anyway?
Taking down corporate networks for cash is quickly becoming a dangerous career. Just last week, the FBI elevated ransomware to a threat level equivalent to terrorism. While that might make some people think twice about joining a cybercrime ring like REvil or...
A White House Request, Billions of Stolen Passwords and Another Infrastructure Attack
The first half of 2021 has been a dangerous time for business networks, and it's not getting any better. In the last two weeks, 8.4 billion stolen passwords were posted online, a ransomware attack shut down 20% of US beef and pork slaughterhouses, and the White House...
The Triple Extortion Threat: New Phishing Technique
Hackers have come up with some convincing new phishing attacks aimed at businesses, and they’ve moved from double to triple extortion by targeting individuals named in leak data. And just wait until you hear how long it takes them to target a vulnerability once it’s...