Hacked with Ransomware? Free Resources and Decryption Tools

As Ransomware continues to hit and lock up systems, there is help to save your files without paying the ransom. According to a Sophos study just 25% of U.S. companies infected with ransomware paid the ransom, while the percentage was much higher for many other countries. Companies such as No More Ransom and ID Ransomware will help you recover your files for free.

Continue Reading…
  •  
  •  
  •  
  •  
  •  
  •  

Phishing Still No. 1 Cause of Data Incidents, Ransomware Attacks on the Rise

A takeover of Microsoft Office 365 accounts may be the first item on the to-do list of bad actors who have breached an organization’s cybersecurity. Baker & Hostetler released its 2020 Data Security Incident Response Report on Thursday, indicating that ransomware is thriving with the help of stolen contact lists pilfered from unprotected accounts.

Continue Reading…
  •  
  •  
  •  
  •  
  •  
  •  

When in Doubt: Hang Up, Look Up, & Call Back

Many security-conscious people probably think they’d never fall for a phone-based phishing scam. But if your response to such a scam involves anything other than hanging up and calling back the entity that claims to be calling, you may be in for a rude awakening. Keep reading to see how one security and tech-savvy individual got taken for more than $10,000 in an elaborate, weeks-long ruse.

Continue Reading…
  •  
  •  
  •  
  •  
  •  
  •  

The Top 20 Critical Security Controls for Effective Cyber Defense

With data breaches increasing, more than ever organizations have to ensure that they have all necessary security controls in place to keep their data safe. As a response to growing security threats, the SANS Institute, together with the Center for Internet Security (CIS) and other organizations, developed the 20 Critical Security Controls (CSC) for Effective Cyber Defense. The CIS CSC provides IT pros with a prioritized, focused set of actions to help them stop the most dangerous cyber attacks and ensure data security.

Continue reading to view the 20 controls in the CIS CSC and why each of them is critical, and then 5 steps for implementing the controls in a pragmatic way.

Continue Reading…
  •  
  •  
  •  
  •  
  •  
  •  

Hackers Are Now Exploiting Zoom’s Spike in Usage to Spread Malware

As people increasingly work from home and online communication platforms such as Zoom explode in popularity in the wake of coronavirus outbreak, cybercriminals are taking advantage of the spike in usage by registering new fake “Zoom” domains and malicious “Zoom” executable files in an attempt to trick people into downloading malware on their devices.

Continue Reading…
  •  
  •  
  •  
  •  
  •  
  •