By now, after the global spread of WannaCry, we can use ‘ransomewared’ as a transitive verb. I may be trying to make light of something nasty here because it’s nasty stuff that has ruined the day for many thousands of people. I hope I never have to help anyone ever navigate their way out of such an insidious trap ever again. Unlikely, that. So, here is some solid, step-by-step advice to take should the gods forbid you ever find yourself in that most unsavory situation.
Nope. The first known ransomware attack on Macs, known as “KeRanger”, was downloaded more than 6,000 times before the threat was contained, back in early 2016. While that number is small compared to the number of ransomware attacks on computers running Windows, these threats are growing and we haven’t seen the worst of them, yet. We can expect to see more attacks on Macs. As more and more people are using them than ever before, those-so-inclined are always finding new ways to exploit Macs.
What is 2-factor authentication (2FA)? 2FA is an essential layer of security designed to ensure that you’re the only person who can access your accounts. Even if someone knows your login name and password, they won’t be able to login to your account without this one-time code that is sent to you via SMS (text message)…
Yesterday alone, I received multiple malicious links in messages sent from email accounts that had been hacked and then used to send out this latest barrage of Google Docs phishing attacks. In each of these messages was a legitimate-looking link to a shared Google Doc. Had I clicked on this link, this is what would…
My wife actually received the following voicemail message last week. It’s pretty compelling but fortunately she is aware enough to suspect these kinds of things. These kinds of scams are getting harder and harder to tell apart from real inquiries. A good general rule of thumb is: always be a little bit suspicious of unsolicited…
Seven days after the release of more than 65 million people were playing it. SIXY-FIVE MILLION PEOPLE.
That’s a big statement about how humans are interacting with machines. Not as in the future but as in RIGHT NOW.
It’s not scary when you understand how your business works, what your risks are and how to minimize them and handle cybersecurity events when they occur. Because they will occur, which is why it’s so empowering to have a plan.
Understanding how your small business works, using the technology you already have, protects your bottom line with less effort and expense. Minimizing complexity and focusing on more deeply understanding your existing technology leads to more secure environments you can monitor and evolve with greater competency and confidence.
During medieval times, intrusion detection was handled by moats, drawbridges, palace guards and fortified structures. Nowadays, we have those, too, they’re just – different.
The value of training over certification is indisputable, especially while there is still a great deal of debate over which certifications matter, which organization to pursue them with, how to fund them and who is responsible for maintaining them.
Smaller businesses are easy targets for cybercriminals because they typically have fewer resources than large enterprises and generally like to think they’re not at risk. Research shows otherwise. Small businesses are low-hanging fruit that can give cybercriminals access to larger enterprises, which is why more and more enterprise-sized clients are demanding they step up their game through education and practical information security strategies. This preparedness is quickly becoming a differentiator as smaller agencies compete for the same clients.
Historically, one approach to making grievances heard is gather a group of people who are likewise interested in voicing their grievances, make some signs and loiter outside wherever whoever whatever company or organization grieves ya.
Things have changed.
It’s not a big secret. Small business needs to be much more proactive about cybersecurity. Smaller businesses are easy targets for cybercriminals because they typically have fewer resources than large enterprises and generally like to think they’re not at risk. Research shows otherwise.
The vast majority of people are compelled to follow best practices while doing things involving risk, such as rock climbing. There is less than a single percent of free-climbers among the whole of rock climbing cultures. The odds of falling during those types of climbs are high enough to not want to talk about it. Why, then, do businesses operate without a rope?
CENTRALIZATION (DIY) vs. DECENTRALIZATION (DIT) The first part of this riff, that I wrote over on my personal blog awhile back, built an analogy that centralization is like DIY (Do-it-Yourself) and decentralization is like DIT (Do-it-Together). If we can agree on that analogy, simply for the sake of conversation, then we can take it a step…
Hackers generally fall into one of three types of “hats”: black, white and grey.
Don’t spend any money on cybersecurity until you read this.
Ever made a 14-second film?
We made one. A documentary about sticks.
The crowd went wild for it.
Ransomeware encrypts entire computers and systems, then demands a payment in order to decrypt them and make them usable, again. If the ransom isn’t paid on time and according to specific instructions, the keys used to encrypt the files and/or computers are destroyed, effectively making it impossible to ever recover the files and/or computers. What can we do about it?
The world is suddenly full of new words, some of which are easy to decipher, while others maybe not so much.
One of these commonly slung around is “malware.” Malware is software designed to disrupt normal operation of our computers, tablets and other systems by gathering sensitive information stored on them and worse: such as installing other pieces of software and gaining access to private computer systems that offer more valuable information and access, thereby increasing the liability and risk attached to allowing malware to proliferate. It comes in far too many forms to illustrate in great detail, so the word is used generally to refer to the vast diversity and scope of the hostile and intrusive forms it takes, including viruses, worms, spyware, adware and trojan horses.