Cybersecurity & IT Insights
Double Extortion Attacks More Prevalent than Ever
Ransomware is still all over the place - attacks are up 62% globally and 158% in North America since 2019. But ransomware-only attacks have mostly been replaced by more sophisticated – and ruthless – attacks. In a traditional ransomware attack, a cyber criminal finds...
Ransomware News: Biggest Attack Ever
Ransomware News: Early July had several cybersecurity events with big impacts on small and mid-sized businesses. Here are three you that should know about. REvil’s Kaseya Attack Hits Thousands of Businesses Worldwide, US Will Respond The biggest news story this week...
7 Types of Malware
The ever-changing IT environment has made it easier for malware to exist and thrive. In today's world, businesses and individuals alike are constantly bombarded with new threats, making it more important than ever to be aware of the latest malware trends. Types Of...
What Is Doxing? And What Does It Have to Do With Cybersecurity?
It sounds bad. It is bad. But what is it? Doxing Doxing is shorthand for “dropping dox” (documents), a phrase invented by hackers in the 90s. Dropping dox means to publish embarrassing or incriminating documents about a person or company online. It’s normally done...
Who Pays All of These Ransoms, Anyway?
Taking down corporate networks for cash is quickly becoming a dangerous career. Just last week, the FBI elevated ransomware to a threat level equivalent to terrorism. While that might make some people think twice about joining a cybercrime ring like REvil or...
A White House Request, Billions of Stolen Passwords and Another Infrastructure Attack
The first half of 2021 has been a dangerous time for business networks, and it's not getting any better. In the last two weeks, 8.4 billion stolen passwords were posted online, a ransomware attack shut down 20% of US beef and pork slaughterhouses, and the White House...
The Triple Extortion Threat: New Phishing Technique
Hackers have come up with some convincing new phishing attacks aimed at businesses, and they’ve moved from double to triple extortion by targeting individuals named in leak data. And just wait until you hear how long it takes them to target a vulnerability once it’s...
What is a Supply Chain Malware Attack?
If you manage a service business, you probably don’t spend much time thinking about your supply chain. But there’s one supply chain that every business needs to manage – data. Operations, sales, finance and HR departments all use different software to generate...
Risks From Old Data
We've all saved seemingly useless items only to later appreciate their value. In contrast, persistently retaining irrelevant things has limited impact. This tendency often delays decluttering, except for reality TV-level hoarding. However, the business data landscape...