Cybercriminals have improved their bait to mount sophisticated attacks against targets of every size in every industry. An economic downturn, COVID-19 anxiety, and the new challenges of securing a remote workforce have opened up new waters for bad actors to trawl, and as these phishing facts show, their catch has been plentiful.
Topics:
Malware,
Cyber Security
Are you familiar with the malware called Loapi? It can literally burn your smartphone to the ground. Loapi was nicknamed the "jack of all trades" of mobile malware. It can be adware. It can turn your phone into a botnet for DDoS attacks. It can do premium text scams, but most importantly, it can cryptojack your gadget. Here's what you need to know to start protecting your business.
Topics:
Malware,
Cryptojacking,
cyberthreats,
#protectyourself,
#smartcomputers,
smartphones
Cybersecurity threats are often associated with larger corporates and multinationals. But the truth is that – as with the recent WannaCry ransomware virus – businesses of any size are at risk.
Topics:
Malware,
Managed Service Provder,
Ransomware
2017 will go down as the year ransomware hit the mainstream, thanks largely to malware known variously as WannaCry, WannaCrypt or WannaCryptor 2.0.
Topics:
Malware,
Managed Service Provder,
Ransomware
WannaCry ransomware made global headlines recently as it infiltrated thousands of SMBs as well as larger operations like telcos, schools and hospitals, including some large-scale victims like the UK’s National Health Service.
Topics:
Malware,
managed it,
network security,
Managed Service Provder,
Ransomware
No one wants to believe they'd fall for a phishing scam. Yet, according to Verizon's Data Breach Investigations Report, 30 percent of phishing emails get opened. Yes, that's right -- 30 percent. That incredible click-through rate explains why these attacks remain so popular: it just works.
Topics:
Insider,
Malware,
network security,
Ransomware,
News Topics
It wasn't long ago when business owners primarily feared break-ins of their brick-and-mortar locations. Nowadays, business owners are just as fearful of digital attacks for good reason. A cyber security break-in has the potential to devastate a business just as much as a conventional robbery. Below, we delve into some tips that will help business owners and managers better secure their organization's data.
Topics:
Malware,
network security,
Ransomware
Sandboxes are isolated computing environments set aside from other programs in which a program or file can be executed without affecting the application it runs or other programs; if an error or security issues occur, those issues will not spread to other areas on the computer or pose any threat to other programs. In computers, the term sandboxing has long been used to run malicious code or to test new programing code so software developers can analyze it.
Topics:
Malware,
network security
Trojan horse. Spyware. Viruses and worms. You’re likely familiar with some the most common security threats to small businesses. Although they go by different names, they all fall under the same cyber security category — malicious software, aka, “malware.”
Topics:
Malware