News Archive
Georgia county pays a whopping $400,000 to get rid of a ransomware infection
Officials in Jackson County, Georgia, paid $400,000 to cyber-criminals this week to get rid of a ransomware infection and regain access to their IT systems.
Ransomware attack on Israeli users fails miserably due to coding error
To prevent from becoming a ransomware victim, organizations need to protect their network now and prioritize resources. These attacks will only continue to grow, and
Companies Stuck in Continuously Reactive Cybersecurity Response Cycle, Optiv Security Report Finds
Nearly two out of three U.K.-based IT and security decision makers say their security program is continuously reactive due to constantly changing legislation, threats, and
Ohio Enacts Law with Cybersecurity Requirements for Health Insurers
According to the legislation, insurers will be mandated to develop, implement, and maintain a comprehensive security program based on their risk assessment. Those entities already compliant
Ransomware has been abandoned in favor of cryptojacking attacks against the enterprise
Ransomware is falling in popularity as cyberattackers look for other ways to earn a criminal living out of compromising enterprise companies, with cryptojacking now capturing
Laptops Pose Serious Data Security Risk to Hospitals, Health Systems
Hospitals and health systems are continuing to struggle with laptop vulnerabilities, caused primarily by endpoint data loss, excessive user permissions, and dormant accounts, according to
Workers use unapproved messaging apps to get their work done
According to Patrick Van Der Mijl, co-founder of Speakap, there are three serious problems with using tools like WhatsApp and Facebook Messenger for employee communications –
Cyber Criminals Cash in on Millions With Formjacking, Posing a Serious Threat to Businesses and Consumers
Faced with diminishing returns from ransomware and cryptojacking, cyber criminals are doubling down on alternative methods, such as formjacking, to make money according to Symantec’s
Managing cloud migration and the end-user experience
Today, the cloud has quickly become the preferred deployment environment for enterprise applications. This shift to using “other people’s infrastructure” has brought with it tremendous
What To Do If You’ve Been Hacked
What do you do if you realise that you may have already fallen foul of malicious activity? In case of an attack, SkyFlok has a