According to recent research, Microsoft’s desktop operating system has a major ransomware vulnerability. It’s nearly invisible, encrypts files using a completely legal protocol, and comes pre-installed on all new Windows systems: OneDrive. Despite its solidified …
All we hear all day long at work is how awful ransomware is, and how ransomware ruins your life – ransomware, ransomware, ransomware! It’s a stretch to make Brady Bunch …
Ransomware has undoubtedly made a name for itself over the past few years. It’s all over the news and the Internet, and it’s certainly earned a prominent place in our …
“Patch Tuesday” has been in the IT lexicon for as long as I remember. For many, many years Tuesday has been Microsoft’s designated day to release patches to Windows. In …
US Treasury Department will take legal action against companies who pay ransom. “Let’s just pay the ransom…” This is something I have heard more than once during a ransomware attack. …
“DC03 shows it’s clean.” That was the word when I took over during a recent cyberattack incident. During this cyberattack, accounts were created, data was encrypted, GPOs were created and …
I can sit here and write until my fingers fall off and disintegrate into a billion pieces about all the best ways to prevent ransomware infections, but all of that …
You should set up a Group Policy to prevent ransomware from running in your environment. Here’s why… Stopping malicious software from penetrating your network is a constant battle that requires …
Cryptolocker ransomware is making its rounds. This virus basically infects your computer or network, encrypts all of the data, and holds it hostage until someone pays a ransom. If a …
Consider this a follow-up to the blog we posted in December where we covered the acquisition, the end of sale of perpetual licensing (and the inability to renew support on perpetual licenses), …
We’ve talked about many different aspects that go into having a layered security strategy in our previous Defense In Depth blogs. Now, let’s talk about the fifth layer of our Layered Security …