Ransomware
-
What is Double Extortion Ransomware?
01/26/22Although this is not a new type of ransomware strategy, double extortion, is making quite the comeback. Double extortion, pay-now-or-get-breached, is where attackers...
Read blog
-
We’re not sure if the Cybersecurity and Infrastructure Security Agency chose the same month as Halloween for Cybersecurity Awareness Month because how flat-out...
Read blog
-
With the proliferation of ransomware attacks on a variety of systems, it’s no longer a matter of “if” an organization’s IT infrastructure will...
Read blog
-
According to a recent report from the Department of Health and Human Services (HHS) Office of Inspector General (OIG), Medicare accreditation organizations (AO) need to drastically improve their cybersecurity posture. The...
Read blog
-
Everyday your news feed is filled with stories of data breaches and ransomware attacks holding businesses hostage for hundreds of thousands if not...
Read blog
-
As news spread yesterday of the ransomware attack on a major U.S. pipeline, one major news outlet described ransomware as a relatively new type of cyberattack. Um, what? Ransomware...
Read blog
-
Manufacturing is finally coming around to the digital transformation, but are your operations prepared for the onslaught of potential cyberattacks that could come your...
Read blog
-
On March 2, Microsoft released critical updates to secure Microsoft Exchange Servers from 4 vulnerabilities. They asked that organizations apply the patches with...
Read blog
-
Manufacturing and ransomware are beginning to make an unlikely duo that industrialists worldwide should avoid at all costs. Cybercriminals are targeting manufacturers for...
Read blog
-
Epicor is moving further into the cloud, and manufacturers are beginning to take notice. If you’re interested in Epicor in Azure, the timing...
Read blog