How To Protect Against Ransomware
With the amount of ransomware cases seeming to increase every day, wouldn’t it be nice to have amazing tips to protect yourself? Well, you’re in luck. So, we've told you how ransomware is spread and informed you about some common types, now we’re going to tell you how you can protect against it. Cyber criminals armed with ransomware are a formidable adversary. While SMBs aren’t specifically targeted in ransomware campaigns, they may be more likely to suffer an attack. Frequen
DHS Issues Warning for Recent Brute Force Cyberattacks
The Department of Homeland Security has issued an alert warning of brute force cyber attacks. According to the alert, hackers are using an attack known as password spraying. Password spray attacks involve an unauthorized user attempting a single password against multiple accounts before moving on to attempt a second password. This process avoids the user's account becoming locked and alerting them about suspicious activity. According to the alert, the attackers use social eng

from SonicWall Security Center
The SonicWall Capture Labs Threat Research Team have come across a fake ransomware Trojan that functions as a bootlocker. It is named Uselessdisk because of the debugging symbols and project name strings that the developer has left in the executable file. Its aim is simple: render the system unbootable and pretend that files on the system have been encrypted. Ask for $300 USD in bitcoin for file recovery. Infection Cycle: Upon running the malware, it quickly reboots the machi


Why You Need An Updated And Thorough Business Continuity Plan
Why You Need An Updated And Thorough Business Continuity Plan Business Continuity Plans (BCP) are defined as documents that try to ensure the safety of personnel and assets in case of a disaster. BCPs are very helpful for a number of reasons: Extremely useful for employees to know where to go and what procedures to run in case of a disaster Provides a documented process for recovery of X computers to Y places by using Z procedures Useful for compliance reasons Helpful to IT P