Illinois: (312) 533-4033                  Indiana: (765) 395-7240
Pennsylvania: (814) 333-3117         Wisconsin: (262) 686-5070

Menu

Tag Archive: Cyberattacks

Common Disasters that Strike Businesses

Many small and midsize businesses fall into a false sense of security with regard to their disaster recovery plans. However, there is no coming back from a disaster if there isn’t a plan in place to recover, or worse, earn back the trust of your clients. There are many common disasters that can affect a business and some may even…
Tuesday, November 6, 2018

Focus on the Basics of Cybersecurity Prevention

As National Cyber Security Awareness Month presses on, one basic question may be sticking in the collective craw of IT directors and business owners alike: where do I start when it comes to cybersecurity prevention? With that in mind, here’s a review of basic steps organizations of all sizes in any industry can take to begin to protect their operations:…
Tuesday, October 23, 2018

Protect Your Business with Cybersecurity Best Practices

There are plenty of reasons cyber criminals target small and medium-sized businesses for cyberattacks. They often assume smaller organizations don’t have the financial means, personnel and know-how to maintain the appropriate levels of cybersecurity needed to run a business today. Just three years ago, the U.S. Congressional Small Business Committee announced that 71 percent of cyberattacks happened to businesses with…
Tuesday, October 16, 2018

Ransomware Becomes Top Cyber Threat

It is easy for organizations to become numb to the threat of ransomware. Many choose to believe that their business is either too small to be a likely target or that your existing cybersecurity measures provide adequate protection. Unfortunately, this optimism has led to the peril of many organizations. SonicWall recently reported there have been 181.5 million ransomware attacks during the…
Monday, August 6, 2018

Cybercriminals Cashing In On Ransomware-as-a-Service

As ransomware continues to gain notoriety, cybercriminals are looking for the quickest, most lucrative way to spread malware and make a buck. Their preferred answer: Ransomware-as-a-Service. Ransomware-as-a-Service is where cybercriminals put their ransomware up for sale, it is then purchased and leveraged by other criminals who are technically unable to develop their own variants. Scary when you stop to think…
Monday, April 23, 2018

Combating Cyberattacks With Disaster Recovery

Cyberattacks are still on the rise, a trend that unfortunately is going to continue to grow. Cyberattacks are pretty much unavoidable anymore, mindsets shifting to a matter of not if, but when. Organizations and systems all over the world that were believed to have been foolproof fell victim to security breaches and malware. Billions of dollars are paid each year…
Monday, April 9, 2018

Protecting Against Ransomware, Malware, and Other Viruses

The fight against ransomware, malware and other viruses is one that never ends and one that is continually changing. Most organizations implemented changes over the last couple years to help protect themselves from outside attacks. The issue is that as malware and ransomware continue to evolve, your network security needs to evolve as well. Your IT strategy needs to address…
Wednesday, February 21, 2018

Cybercriminals Expanding Their Footprint

Things are not always as they appear. A recently released report on 2017 ransomware showed that there was a decline in Q4. Considering how much malware has been in the news, that is going to make many people question what is going on. Ransomware is only one form of malware that cybercriminals use to exploit their victims. Attempts at delivering…
Friday, January 26, 2018

Spider Ransomware Gives Victims 4 Days

Just when you think you have seen it all, a new spider ransomware changes the game. Attackers behind a new ransomware campaign are offering an easy tutorial video to ensure they make money from their criminal activities. This spider ransomware is being distributed through malicious Office documents, infecting victims with file-encrypting malware. This strand of ransomware was only detected a…
Wednesday, December 13, 2017

Cyberattacks On Operational Technology

If you are one of the other million viewers of the ABC hit drama Grey’s Anatomy and tuned in last week, you saw in action what a cyberattack on operational technology might look like. Operational technology is hardware and software that controls physical devices or processes in environments such as buildings, factories and utilities. The WannaCry and Petya attacks opened many…
Tuesday, November 21, 2017