Greetings. This week, credit reporting giant Equifax gets breached, Locky ransomware attacks resurface, plus new and forthcoming international regulations and their potential effects on your cybersecurity efforts. As always, feel free to share any opinions, reactions, suggestions, or tips. Thanks …Read more
My advice to everyone: drink deeply of the elixir that is cybersecurity user education. If my recent experiences are indicative, it’s delicious and nutritious, at least for your contributions to your own cybersecurity and that of your home, workplace, or …Read more
First off, I have to say I hate this title. When did security of IT assets and systems become something different from service management?
Is it because ITSM has just fallen into the “that’s a help desk thing” bucket? That…
Many successful ransomware/other malware attacks share two characteristics. One is that they gain access to an enterprise network because a legitimate, authorized user does something they shouldn’t. Such as opening a phishing email, clicking on a bogus web link, or …Read more
With ransomware exploding, we’re frequently asked how to remediate after an attack.
Ransomware is becoming more common and bad guys are becoming more sophisticated, using innovative ways to evade the latest detection techniques. Can you trust your AV (gen1 or …Read more