Software Contract Solutions

Ransomware: Cyber criminals are still exploiting these old vulnerabilities, so patch now

Years-old security vulnerabilities remain a common attack method for ransomware attacks because organizations aren’t applying the patches to fix them. Some of the cybersecurity vulnerabilities most commonly exploited by cybercriminals to help distribute ransomware are years old — but attackers are still able to take advantage of them because security updates aren’t being applied. Cybersecurity … Read more

Palo Alto launches an enterprise-grade security pack for remote workers

Palo Alto’s Okyo Garde package includes a WiFi-6-based hardware device and mobile application software to deliver malware, ransomware and phishing protection. Palo Alto Networks has rolled out a Wi-Fi based package that the company says provides remote workers with enterprise-class security features. Called Okyo Garde, the bundle incuds Wi-Fi-6-based hardware and mobile application-security software that … Read more

Ransomware: Now attackers are exploiting Windows PrintNightmare vulnerabilities

Cyber-criminal groups including Vice Society and Magniber have been spotted using vulnerabilities in Windows Print Spooler to infect victims with ransomware. Cyber criminals are exploiting Windows PrintNightmare vulnerabilities in their attempts to infect victims with ransomware – and the number of ransomware groups attempting to take advantage of unpatched networks is likely to grow. The … Read more

Ransomware demands and payments hit new records

Ransomware groups continue to intensify their operations as ransom demands and payments increase alongside use of “quadruple extortion” tactics during first half of 2021. The average ransom paid by victim organisations has increased by 82% since 2020 to a record  $570,000, as cyber criminals intensify their ransomware efforts with increasingly aggressive tactics, according to data … Read more

Ransomware recovery: Plan for it now

Make a disaster-recovery plan to address ransomware attacks, and start with stopping its spread, IDing the variant and getting ready to get restore your files. If your computing environment is subject to a large ransomware attack, you will most certainly be enacting your disaster recovery (DR) plan. But before you begin restoring systems, you must … Read more

The hidden costs of ransomware

The catalogue of high-profile ransomware attack examples is growing larger and becoming more alarming every day, affecting everything from gas pipelines to transport and technology firms. And as the range of targets for ransomware attacks grows, the average value of ransom payments being demanded by cyber criminals is also skyrocketing. In fact, the average ransom payment was … Read more

How to protect backups from ransomware

Backups can be defended against ransomware attacks by moving them offsite from primary systems, removing file-system access to the backups, and avoiding using Windows as a backup platform. Ransomware is becoming the number one threat to data, which makes it essential to ensure that bad actors don’t encrypt your backup data along with your primary … Read more

Make sure your laptop backups can handle ransomware

There’s more than one way to backup laptop data, but not all of them can defeat the tricks attackers have designed into ransomware. With increasingly mobile workforces, it’s important to effectively backup corporate data that resides on laptops, which requires a unique set of features not found in traditional backup systems used for desktops attached … Read more

Healthcare CIOs fear (and fend off) ransomware threats amid pandemic

Hospital IT leaders are fending off more hackers looking to capitalize on the COVID-19 crisis for financial gain. Mt. San Rafael Hospital thwarted a ransomware attack on one of its sister facilities earlier this year before anything could be compromised. The organization is still working through the details of the hack, says CIO Michael Archuleta, … Read more

Ransomware: How to make sure backups are ready for a real attack

Avoid paying off ransomware attackers by following these steps to ensure backups can restore infected systems. The best way to avoid paying ransom to attackers who have infected your systems with ransomware is to have those systems adequately backed up so you can wipe them and restore them from safe backups. Here are several options … Read more