“Well, there’s a sign upon your door Gone phishin’ You ain’t workin’ anymore…” (with apologies to Bing and Satchmo) When it comes to compromising data security, cybercriminals have a vast selection of tools at their disposal. Their most effective tool, however, is the one that exploits your weakest link – your employees. Phishing attacks account […]
We’ve written about Cryptowall ransomware before on a couple of occasions (A Ransomware Survival Story; Ransomware Recovery – Be Ready in Advance). Ransomware isn’t new, but it continues to evolve – and that isn’t a good thing. And just in case you’re still not sure what ransomware does…it’s malicious software that renders your files unusable […]
Regardless of the layers of security in place, these layers of security are no match sometimes for the human factor. Even an employee of a technology company can be fooled into believing that an email attachment is genuine. And that’s just what happened. An email made it through our multiple layers of protection.