This week the White House released its long-awaited National Cyber Strategy. It outlines how the Biden administration intends to defend the U.S. from cyber threats. The essence of the plan is a “reimagining” of “America’s cyber social contract” according to Acting...
During the holidays is when we see a spike in network attacks. Why is that? Most IT firms and businesses run a skeleton crew since a lot of staff need to use their PTO or just take off for the holiday. Hackers know this and have been planning on it most likely all...
Ransomware is an insidious and pervasive security threat that continues to evolve and grow in its efforts to profit from cyberattacks on businesses. The latest development in Ransomware’s evolution isn’t technology-based, but rather a new organizational business...
Ransomware attackers are increasingly using a new tactic that helps them encrypt victims’ systems faster and more efficiently, while decreasing the chances of being detected. The new tactic is called intermittent encryption. It encrypts only parts of the file content...
Phishing is a method of cyberattack used by hackers to gain access to your personal information. It is the most common start/warning sign of a ransomware attack. Phishing attacks can occur via email, mobile, social media, and phone calls. In each case, the attacker...