In a lot of these blog articles on security I always say you need to keep your software up to date. But what happens when that so called update is ransomware? This is the nightmare caused by an emerging cybersecurity threat called Big Head. Continue reading
When most businesses get breached, the business owners don’t know until well after the event. This blog article aims to show some of the signs of a data breach so that you can help you mitigate the damage. Continue reading
Malware (short for malicious software) is an umbrella term that encompasses many different types of malicious code including:
- Key loggers
- And more
Phishing is the number one method of attack for everything from ransomware to credential theft. Email phishing is the main method for delivery but other delivery means are on the rise. Continue reading
Most people see reports on ransomware hitting government departments, hospitals and other big name companies. As such they think it won’t happen to them as the bad guys are just targeting the larger companies and organisations, but ransomware can just as easily infect your own computer. Continue reading
There’s been a lot in the news over the last few weeks about ransomware attacks. As the media can give people the wrong impression let me clear up some things for you. Continue reading
If you get hit with ransomware there will be a number of indications, including:
- A screen telling you that your business files are encrypted.
- You can’t open any of your documents.
- Your files may have a weird extension of different icon.
- there will be instructions for how to pay up to recover your files.
This blog article details a number of steps you can take instead of paying the ransom straight away. Continue reading
If you want to scare someone in computing then start talking to them about ransomware. There are few things as scary for IT professionals as the prospect of systems locking up with hackers demanding money to return things back to normal. Continue reading
You should have heard about ransomware by now. Cyber-criminals access and encrypt your data and you have to pay a “ransom” for the key to unlock your data. If you have a backup you can revert to that and forget about the hackers threats. Leakware (also known as extortionware) is similar, but now the bad actors are threatening to post your confidential information online if you don’t pay up. Continue reading
Ransomware is a when cybercriminals kidnap your data (via encryption) and then demand money so that you can decrypt your own data. It sounds scary and it certainly is! Here are the top seven things you need to know about ransomware. Continue reading