Tag: Malware
June 25, 2024 |
SMBv3 Vulnerabilities Explained
Workplaces have evolved. While hybrid and remote work existed before COVID-19, these working arrangements became even more prevalent during and after the pandemic. Today, workplaces offer the flexibility for employees to work and access company resources from anywhere worldwide, with the Server...
June 16, 2022 |
A Guide to CIS Control 10: Malware Defenses
Control 10 of CIS Critical Security Controls version 8 is focused on malware defenses. It describes safeguards to prevent or control the installation, spread and execution of malicious applications, code and scripts on enterprise assets. (In CIS version 7, this topic was covered by Control...
November 30, 2021 |
Get a Quick Win in the Battle Against Ransomware by Disabling SMBv1
Server Message Block (SMB) is a Microsoft communication protocol used primarily for sharing files and printer services between computers on a network. SMBv1 dates back to the LAN Manager operating system and was deprecated in 2013 — so why should you care about it?
I can answer in one word:...
September 3, 2020 |
How to Detect Ransomware
The second most common type of malware incident is the notorious ransomware attack. According to the Verizon 2020 Data Breach Investigations report, the primary aim of a ransomware attack is “to disrupt operations badly enough and long enough that the organization will pay the ransom.” The...
June 12, 2020 |
How to Prevent Malware Attacks: 10 Security Tips
According to Verizon’s 2019 Data Breach Report, 28% of data breaches involve malware. This dangerous software threatens every organization and is becoming more common every day. Companies must work hard to prevent malware infections in order to:
Protect sensitive information and critical...
September 20, 2018 |
Securing Your Servers with Windows Defender, AppLocker, SCT and More
Malware — computer viruses, worms, Trojan horses, ransomware, spyware and so one — is a continuous threat to organizations because it can damage devices and enable unauthorized parties to access the network remotely to collect and transmit sensitive information. Windows Server 2016 includes...
December 20, 2016 |
Security Practices: 3 Good Reasons to Gap Your Backup
Everyone knows how important it is to back up their data, right? Sadly, I feel like I should laugh after saying that because I know many people that don’t understand this basic concept. If you are reading this though, you are likely in the IT field, so should know that old saying: If you aren’t...
September 30, 2016 |
3 Pokémon GO Security Risks
Are your employees or colleagues caught up in the Pokémon GO craze? Surely, most of them are. However, in the hunt to “catch ‘em all,” Pokémon GO users expose themselves to a variety of security risks. Moreover, playing the game presents major security risks for corporate information. In...
March 18, 2016 |
Cryptolocker: When Antivirus Cannot Help
There is currently much talk about Cryptolocker and other kinds of ransomware. Cryptolocker is such kind of malicious program that, once it is active, starts encrypting files it can access on a local system or on network shares and then threatens to hold your data hostage until you pay.
Users...
March 3, 2015 |
4 Ways to Avoid Malware Like Lenovo Superfish
PCs sold by Lenovo between September 2014 and January 2015 came pre-installed with Superfish VisualDiscovery, a piece of malware claiming to improve users’ Internet experience by adding visual results to Google search and other websites. But in reality, the main purpose of the software was to add...