6:49 am 27/08/21

Ransomware: Tried & True Defenses

2022-03-15T12:52:58-04:00

Ransomware: Tried & True Defenses "The vast majority of the companies being attacked by ransomware have fewer than 1,000 employees. But with proper backups and local encryption, you can hold attackers off." Read about ransomware defenses in an article [...]

Ransomware: Tried & True Defenses2022-03-15T12:52:58-04:00
9:49 am 22/12/20

Different Ways to be a Ransomware Victim, and How to Avoid Them

2022-03-15T11:52:39-04:00

Different Ways to be a Ransomware Victim, and How to Avoid Them "Ransomware is once again in the news. Attackers are reportedly targeting health care providers and are using targeted phishing campaigns disguised as meeting invites or invoices that [...]

Different Ways to be a Ransomware Victim, and How to Avoid Them2022-03-15T11:52:39-04:00
2:51 pm 02/12/20

Cyberattack Attribution Pitfalls

2022-03-15T11:55:28-04:00

Cyberattack Attribution Pitfalls "Attack attribution is always difficult as criminal groups often share code and techniques, and nation-state actors excel at deception. Here, security researchers share their techniques and common pitfalls. Attributing cyberattacks to a particular threat actor is [...]

Cyberattack Attribution Pitfalls2022-03-15T11:55:28-04:00
4:54 pm 04/08/20

VoIP & Unified Communications Attacks on the Rise

2022-03-15T12:05:14-04:00

Businesses use on-prem and cloud-based unified communications (UC) to connect distributed workforces but often don’t realize the security threats hidden within popular UC services, but they should, and they should address them. There has been a sharp rise in [...]

VoIP & Unified Communications Attacks on the Rise2022-03-15T12:05:14-04:00
Go to Top