Ransomware a Risk for You, Too
Ransomware headlines focus on interrupted hospital services or downtime at several major brands. But ransomware can just as easily infect your home computer. [Read more…]
by Tony Whitney
Ransomware headlines focus on interrupted hospital services or downtime at several major brands. But ransomware can just as easily infect your home computer. [Read more…]
by Tony Whitney
Few of us would think we could run a marathon, or even a 10-mile race, without training first. Yet the number of people who think they could successfully run a 50-meter dash jumps dramatically, especially if they were being chased by a criminal, cougar, or scary clown. Still, that short sprint would be much easier with proper training, too. So, what does this have to do with IT? A lot, actually – keep reading.
Many businesses are taking a “we’ll dash when we need to” approach to IT. The news of ransomware at a hospital or a data breach at a national mobile carrier gets them spooked, and they are immediately running to try to solve the perceived cybersecurity problem. They’ll buy the newest app or device available, because it must be the best, right? After that, they plod along, not paying much attention to good security practices, until the next spike in adrenaline has them dashing to ramp up IT infrastructure again.
But anyone who tries running without stretching or putting on proper shoes knows it is painful. If not in the moment, then the next day when the muscles say, “no way are we getting out of bed today.”
In the IT equivalent, it is more effective to put effort into identifying the best technology for you. Reliable IT isn’t about dashing for that latest device or running from the newest attack – it’s a marathon. You need to be working on it continuously.
Consistent practices such as ongoing equipment maintenance and patching software provide security long-term. Updating IT to better address threats or improve efficiency beats a reactionary buy.
Plus, by taking the time to make considered purchases, you can be sure you buy technology that:
Think about the marathon runner who sets out a training schedule 12 weeks before the big race. They’re a lot less likely to give up or get hurt. Taking a long-term view of your IT needs offers the same benefits. You’re less likely to let it slide after the dash or experience costly downtime.
If you watched the Olympics, you’ll have seen sprinter and distance runner coaches. In your push to build up your cybersecurity muscles, a managed service provider (MSP) can be a big help, too.
Partner with an MSP to gain access to IT experts. They can maintain tech, consult on upgrades, and help secure systems. Instead of paying for an urgent fix, budget around lower, predictable fees for proactive care.
Yes, we can also help you if you have to dash. MSPs have the expertise to diagnose and solve tough IT problems, but we’d much rather run the race alongside you, helping to keep your IT environment in tip-top shape mile after mile.
by Tony Whitney
You’ll know if you’re a victim of ransomware. Often you’re met with a red screen telling you your business files are encrypted. You won’t be able to do anything on the computer, although the cybercriminals will provide helpful instructions for how to pay up. How nice. Here’s what to do instead if you’re the victim of a ransomware attack. [Read more…]
by Tony Whitney
Your business may not be supplying oil to the United States, and you may not even be in the critical infrastructure business, but don’t think that means ransomware can’t happen to you, too. This article shares lessons learned from a headline-grabbing event, and they’re applicable to businesses of all sizes in all industries. [Read more…]
by Tony Whitney
Locking your front door after a burglar has already ransacked your house doesn’t do much, and the same is true of cybersecurity. With the help of a managed service provider, you can stay ahead of security threats with well-tested, leading-edge technologies.
Ransomware, Trojans, crypto mining and more make the news regularly these days. Businesses and consumers are both aware of the threats. Yet there is no single vaccine that can keep you safe. The volume of threats is growing. Cybercriminals are mixing up their tactics to outwit their targets, and the result is increasingly sophisticated cyberattacks. [Read more…]
by Tony Whitney
Protecting your business against the latest IT threats should always be a top priority. Updating antivirus and patching your operating system is a great way to start. What happens, however, when a threat appears at your door before security firms have had a chance to catch it?
A security threat that exploits a previously undiscovered vulnerability in the computer is known as a zero-day threat. The name “zero-day” is designed to imply how long since the vulnerability was discovered. The term also indicates that system developers have had zero days to fix it. [Read more…]
by Tony Whitney
(We reached into the files to bring this article written in 2016 back - please excuse the older statistics and just know that the number of attacks is increasing along with the ransom demands)
More and more businesses and organizations are getting stung by ransomware demands. Hospitals, schools, social networks…some days it seems like an epidemic that leaps around arbitrarily, and hackers are raking in millions. [Read more…]
by Tony Whitney
Getting hit with a ransomware attack is never fun, your files get encrypted by cybercriminals and you’re left having to decide: should we pay to get them back? It’s a scene that’s played out across the world with 70% of businesses saying ‘yes’ in 2016 alone. Here’s what you should consider if you’re ever in this situation. [Read more…]
by Tony Whitney
A new ransomware variant has been discovered for macOS. Yes, even Mac/Apple computers can get infected with malware like viruses and RansomWare. Ransomware is a specific type of malware that targets your files and locks them up. It then requests that you send them payment in order to get your files back! Of course, even after you pay there is no guarantee that these criminals will actually unlock your files. The biggest take away from this is that you should be using virus protection on your Apple computer, be it an iMac, Macbook Pro, Mac Pro or Macbook Air. The other important puzzle piece: A good backup. It’s always best to keep from being hit with malware in the first place, but in case you do get hit it’s extremely important to have a solid off-site backup available. A simple USB Hard Drive attached to your computer is not as ransomware can simply lock the files stored there as well. [Read more…]
by Tony Whitney
You’ve heard about ransomware by now. Cybercriminals access and encrypt your data. You have to pay a “ransom” for the key to unlock it. Leakware is similar, but now the bad actors are threatening to post confidential information online if you don’t pay up. [Read more…]