Quantcast
Channel: Ransomware – Information Security Buzz
Browsing all 103 articles
Browse latest View live

Almighty Mistakes: The Danger Of Accidental Insider Threats And How To...

Insider threats may sound like an act of revenge – disgruntled employees, contractors or partners misusing their access privileges to cause harm to an organisation, most often resulting in the loss of...

View Article


Strategies for Merchant Ransomware Protection

Introduction Ransomware attacks have become a significant threat to businesses of all sizes, including merchants who rely on electronic payment systems for their operations. These malicious attacks can...

View Article

Celebrating 20 Years Of Cybersecurity Awareness: Secure Our World

October is a month known for many things: the change of seasons, the approach of Halloween, and, importantly, Cybersecurity Awareness Month. This year is especially momentous as it marks the 20th...

View Article

Information Protection Methods Using Modern Data Backup Techniques

Introduction In today’s digital age, information is the lifeblood of businesses and individuals alike. It is essential to safeguard data from various threats, including hardware failures, cyberattacks,...

View Article

No MSP Can Afford to Ignore These Essential Tools

Managed Service Providers (MSPs) play a crucial role in today’s digital landscape. They are responsible for ensuring the smooth operation of IT systems, networks, and infrastructure for a wide range of...

View Article


IT Disaster Recovery Best Practices: Preparing for the Worst

In the world of modern business, information technology (IT) is the backbone of operations. From managing data to communication and critical applications, IT systems are integral to daily functions....

View Article

Mitigating Cloud Exploitation Risks At The Edge

Following the global pandemic, enterprises have accelerated their transition to the cloud. The Infrastructure-as-a-Service (IaaS) cloud computing model facilitates remote work, speeds up digital...

View Article

Cybersecurity: A Shared Responsibility For A Safer Digital Landscape

In the digital era, where technology has become an integral component of business operations, cybersecurity has emerged as a crucial concern. Leveraging digital platforms for communication, commerce,...

View Article


The Top 10 Greatest Options for Microsoft Office 365 Backup in 2023

Introduction: Microsoft Office 365 has become a staple in the business world, offering a wide range of productivity tools, collaboration features, and cloud-based services. While Office 365 provides...

View Article


Cybersecurity Prediction 2024: Trends & Threats

As technology continues to advance, so do the threats to cybersecurity. With data breaches and ransomware attacks becoming more frequent, it is crucial to stay ahead of the game. In this blog, we will...

View Article

Effective Security Strategy for Businesses

Information Security Governance – IV In today’s digitized world, businesses of all sizes face the constant threat of cyber attacks. The security landscape is evolving rapidly, with threat actors...

View Article

Enhance Your Digital Crime and Security Practices Today

CISSP Study Guide – X Key Highlights Introduction In today’s digital world, the threat of cybercrime looms large. From phishing scams and identity theft to ransomware attacks, individuals, businesses,...

View Article

Understanding Cloud Access Security Brokers (CASB)

Key Highlights Introduction Cloud access security brokers (CASBs) are increasingly becoming a critical component of enterprise security in the ever-expanding cloud landscape. As organizations embrace...

View Article


Understanding and Mitigating Common Cyber Risks and Vulnerabilities

Cybersecurity has moved to the top of every CIO’s agenda in the last few years as organizations in every industry battle to navigate an increasingly complex threat landscape. Adversaries are more...

View Article

Decryption Tool for Petya Ransomware

An unidentified programmer with twitter handle leostone produce a tool that can generate the password used to decrypt a Petya encrypted computer. This is good news for Petya ransomware victims who can...

View Article


Carbon Black United Threat Research Report Reveals How Cyber Attackers...

Carbon Black®, a leader in Next-Generation Endpoint Security (NGES), today announced the results from its first Unified Threat Research report, which details how PowerShell, a scripting language...

View Article

Cerber Ransomware Is on the Rise

In the world of computers, viruses are not an uncommon thing to hear. Viruses are to computers what infections are to humans. Infections can make you sick and often impair you from taking part in your...

View Article


Banking Trojans Merge to Steal $4M

IBM has discovered a new piece of malware that has stolen $4 million from more than 24 American and Canadian banks in just a few days. The hackers combined code from two malware types, known as Nymaim...

View Article

Implementing Disaster Recovery as a Service to Avoid Losing your Business

Protecting a business from natural disasters and unwanted trespassers will probably come as second nature. But in the age of a digital revolution, protecting data from cyber intrusion, human error and...

View Article

What Do You Know About Proxy Servers?

For those already familiar with the function of a proxy server, there’s a good chance that the mere mention of them brings up images ranging from, that of your friendly network engineer to those of...

View Article
Browsing all 103 articles
Browse latest View live