What is a Man-in-the-Middle Attack?

      Posted by Peter Zeller on Oct 29, 2019 8:00:00 AM

      With the many, many different types of cyberattacks out there, it is easy to forget about or be unaware of the lesser known ways that your data could become compromised. Being unaware and uninformed about types attacks can leave you vulnerable to that exact attack. Researching the different types of network attacks has the potential to save your business from ransomware and other serious breaches. 

      Read More

      Topics: Cloud Security, Cyber Threats

      4 Ways to Protect your Business from Ransomware

      Posted by Logan LeClair on Aug 14, 2019 10:15:00 AM

      Ransomware has become a keyword that triggers a quiver-like response in most business owners and IT Managers. This is for a good reason, as Ransomware has the ability to encrypt all of your business-critical data, disabling you access to the most important pieces of your enterprise. Cybercrimes, like Ransomware, are the fastest growing causes of data center outages, up 22 percent in 2016, and can cost you upwards of $3M in down-time costs. Don’t let a cyber-criminal ruin your reputation or halt your sales, take initiative to prepare yourself now! The cost to prepare is minuscule, compared to the impact of an attack, and WILL put you in a position where you will never have to negotiate with a criminal. Without further ado, here are four things you will need to protect yourself from those pesky cyber criminals.

      Read More

      Topics: Disaster Recovery, Backup, Cyber Threats

      5 Technology Attack Vectors to Watch For

      Posted by Jill Sullivan on Jul 30, 2019 9:00:00 AM

      With the internet now an indispensable aspect of the lives of most people, cybersecurity can no longer be considered an afterthought. On a daily basis, people conduct financial transactions as well as exchange their private information over the internet. This trove of data exchanged has become a target for cybercriminals who devote their time and resources devising ways to access and exploit sensitive data. With recent reports revealing that the average cost of a cyber attack is over $1 million, it is essential to make sure that your business is fully protected from any form of cyber threat.

      Read More

      Topics: Cybersecurity, Cyber Threats

      Common Ransomware Infection Methods and How to Avoid Them

      Posted by Sydney Diedrich on Jul 11, 2019 9:00:00 AM

      Ransomware is an ever-growing problem, affecting thousands of businesses every day. According to the Kaspersky Security Bulletin, a firm is hit with Ransomware every 40 seconds. Even when you think you may have outsmarted an attacker, new variants of ransomware and tactics to attack arise and lock your files away for ransom. Because of this, ransomware is not likely to see a downward trend anytime soon; with more attacks imminent, how can you avoid exposure?

      Read More

      Topics: Cyber Threats

      7 of the Most Common Phishing Attacks and How to Protect Against Them

      Posted by Jill Sullivan on May 15, 2019 7:30:00 AM

      With internet access and availability having increased significantly over the past few years, more people now conduct their transactions online. Knowing this, cybercriminals spend considerable amounts of time and money looking for ways to access private personal information or confidential business information for nefarious reasons. Of the many techniques used by cybercriminals to obtain private and confidential information, one of the most endemic is phishing.

      Read More

      Topics: Cybersecurity, Vulnerability Protection, Cyber Threats

      How Crypto-Jacking Can Harm Your Business

      Posted by Matthew Fall on May 1, 2019 7:30:00 AM

      If your business is concerned about cybersecurity and you haven’t heard about crypto-jacking, you’ll need to catch up quickly. You may have heard about ransomware, but crypto-jacking has now become the more popular technique for cyber-criminals to attack and profit off your business. In 2018, occurrences of crypto-jacking increased by 450%. According to a study, Youtube, the Los Angeles Times, and even Showtime have fallen victim to crypto-jacking. Here’s how crypto-jacking can harm your business and what you can do to stop it.

      Read More

      Topics: SECaaS, Vulnerability Protection, Cyber Threats

      9 Variants of Ransomware

      Posted by Sydney Boman on Dec 18, 2018 7:00:00 AM

      If you haven't heard about Ransomware by now you must have been living under a rock. This growing cyber threat has taken out millions of IT environments and shows no signs of stopping. And just as it seems we get one step ahead of the virus, a new variant is created that targets a new vulnerability in our systems.

      Read More

      Topics: Cyber Threats

      The Cost of Cyber-Attacks in Healthcare

      Posted by Matthew Fall on Nov 28, 2018 10:07:00 AM

      Cybersecurity is top of mind for IT professionals, especially those working in the healthcare industry. The costs associated with a cyber-attack, like ransomware, malware, and other viruses, has increased since 2017. According to a study performed by Ponemon, in 2018 the cost associated with a data breach for the healthcare industry has been $408 per patient record, up from $308 per patient record the previous year 

      Read More

      Topics: SECaaS, Cloud Security, Cyber Threats

      Best Practices for Preventing Ransomware Attacks

      Posted by Matthew Fall on Aug 23, 2018 12:00:00 PM

      Businesses are losing millions of dollars to ransomware attacks. It holds your business’ data hostage in exchange for money demands. Within a short amount of time, the ransom will double or your data will be lost forever. The most recent large scale ransomware attack, WannaCry, was a worldwide virus that infected Microsoft Office applications. This specific ransom demand was $600 per infected device, payable in Bitcoin only. It infected thousands of small to medium size businesses, but large, enterprise business are susceptible too. The City of Atlanta was shut down in March due to a ransomware attack.

      Read More

      Topics: Cyber Threats

      How to Navigate a Ransomware Attack

      Posted by Sydney Boman on Apr 3, 2018 10:07:00 AM

      Ransomware is a leading cause of downtime today and can affect any industry at any time. For this reason, it is important to be prepared and implement the proper precautions to ensure the recoverability of your data. In order to protect your business from Ransomware it is important to employ these 5 tactics, commonly referred to as the 3-2-1-1-0 rule:

      Read More

      Topics: Backup, Cyber Threats