Corporate smartphones and tablets store a significant amount of valuable data. Combine that with their mobile nature and they’re particularly vulnerable to being compromised or stolen. Everyone, including the National Security Agency (NSA), is looking for the next big thing in mobile security, and it might just be virtualization.
By now, you must have heard of the WannaCry ransomware. It ranks as one of the most effective pieces of malware in the internet’s history, and it has everyone worried about what’s coming next. To guard yourself, the best place to start is with a better understanding of what made WannaCry different.
Recently, an unprecedented strain of ransomware known as “WannaCry” infected hundreds of thousands of computers across the globe. This horrible campaign has forced small businesses to revisit the security of their IT infrastructure. It’s a complicated endeavor, but reevaluating your web browsers is a quick and easy place to start.
If you’ve ever had a problem with how Microsoft Windows updates are rolled out, we have some good news. In a recent announcement, the team behind the world’s most popular operating system promised to make updates more consistent and user friendly.
With as much as we write about sophisticated malware and security breaches, sometimes the most effective attacks are the ones that prey on human error. In the most recent case, all it took was an email with a perfect imitation of one of Google’s security screens.
Every IT solution in your organization will encounter malware at some point or another. Some solutions are malware liabilities, others are assets. When it comes to virtualization, there are several cyber security benefits for improving your malware readiness.
So much of cybersecurity depends on adequate awareness from users. Phishing for example, preys on people’s fears and desires to convince them to click on hyperlink images and text before checking where they actually lead to. However, with the latest trend in phishing, even the most cautious users can get swept up.
Accusations of inappropriate government surveillance have been swirling after Wikileaks recently released thousands of pages supposedly detailing the CIA’s exploitation of compromised devices and applications. But in today’s climate, every headline needs to be taken with a grain of salt.
We’ve gotten so caught up discussing ransomware prevention with our clients that we’ve neglected to mention that several strains have already been defeated. In fact, there’s a decent chance you can actually decrypt all your data for free. Always make sure to check these lists before responding to a cyber attacker’s demands.
Cybersecurity experts stumbled into a ransomware variant late last month, but this one doesn’t target Windows devices. The malware, known as OSX/Filecoder.E, encrypts Mac data like any cryptolocker strain many businesses have seen in the past. However, unlike normal ransomware that release files after the Bitcoin ransom is paid, this new strain makes no such promises.