Search Results

Searching for: "ransomware"

Microsoft OneDrive: A Willing Ransomware Double Agent

According to recent research, Microsoft’s desktop operating system has a major ransomware vulnerability. It’s nearly invisible, encrypts files using a completely legal protocol, and comes pre-installed on all new Windows systems: OneDrive. Despite its solidified …

Read More

VMware ESXi Versions 6.0, 6.5, 6.7, 7.0 Vulnerabilities Target For Ransomware

All we hear all day long at work is how awful ransomware is, and how ransomware ruins your life – ransomware, ransomware, ransomware! It’s a stretch to make Brady Bunch …

Read More

Ransomware: Prevent, Protect, Remediate

Ransomware has undoubtedly made a name for itself over the past few years. It’s all over the news and the Internet, and it’s certainly earned a prominent place in our …

Read More

Ransomware Targeting VMware: Apply Patches Regularly!

“Patch Tuesday” has been in the IT lexicon for as long as I remember. For many, many years Tuesday has been Microsoft’s designated day to release patches to Windows. In …

Read More

Paying Ransomware Will Cost You (More Than Just Bitcoin)

US Treasury Department will take legal action against companies who pay ransom. “Let’s just pay the ransom…” This is something I have heard more than once during a ransomware attack. …

Read More

How to Find Ransomware-Infected Machines

“DC03 shows it’s clean.” That was the word when I took over during a recent cyberattack incident. During this cyberattack, accounts were created, data was encrypted, GPOs were created and …

Read More

I’ve Got Ransomware! What Do I Do?

I can sit here and write until my fingers fall off and disintegrate into a billion pieces about all the best ways to prevent ransomware infections, but all of that …

Read More

A Case for Using Group Policy to Prevent Ransomware from Running

You should set up a Group Policy to prevent ransomware from running in your environment. Here’s why… Stopping malicious software from penetrating your network is a constant battle that requires …

Read More

Yet Another Reason for a Solid Backup Solution: Cryptolocker Ransomware

Cryptolocker ransomware is making its rounds. This virus basically infects your computer or network, encrypts all of the data, and holds it hostage until someone pays a ransom. If a …

Read More

Decoding VMware’s New Licensing Model

Consider this a follow-up to the blog we posted in December where we covered the acquisition, the end of sale of perpetual licensing (and the inability to renew support on perpetual licenses), …

Read More

Defense In Depth – How End-User Training & SAT Strengthen Cybersecurity

We’ve talked about many different aspects that go into having a layered security strategy in our previous Defense In Depth blogs. Now, let’s talk about the fifth layer of our Layered Security …

Read More

Press enter to search