logo
January 13, 2022 | Elena Vodopyan

Cybersecurity: What to Expect in 2022

As the pandemic continues, organizations around the world are working hard to adapt to the "new normal." This article highlights the key trends that we will face in 2022 and beyond. Ransomware will be an even more devastating threat in 2022. Ransomware attacks more than doubled in 2021 compared...
November 30, 2021 | Kevin Joyce

Get a Quick Win in the Battle Against Ransomware by Disabling SMBv1

Server Message Block (SMB) is a Microsoft communication protocol used primarily for sharing files and printer services between computers on a network. SMBv1 dates back to the LAN Manager operating system and was deprecated in 2013 — so why should you care about it? I can answer in one word:...
November 30, 2021 | Jeff Warren

Performing Pass-the-Hash Attacks with Mimikatz

Mimikatz has become the standard tool for extracting passwords and hashes from memory, performing pass-the-hash attacks, and creating domain persistence through Golden Tickets. Let’s take a look at how easy Mimikatz makes it to perform pass-the-hash and other authentication-based attacks, and...
November 30, 2021 | Jeff Warren

How to Detect Pass-the-Hash Attacks

Attackers frequently rely on lateral movement techniques to infiltrate corporate networks and obtain privileged access to credentials and data. In particular, one common technique is pass-the-hash: Hackers use stolen password hashes to authenticate as a user without ever having the user's...
December 24, 2020 | Ryan Brooks

Data Security: What Happened in 2020, Continues in 2021

The year 2020 has been a time of unprecedented change. This year’s events continue to alter the course of cybersecurity, making it even more important to ensure that we better prepare ourselves for what’s to come. In this blog post, we review the key data security trends of 2020 and share...
September 3, 2020 | Jeff Melnick

How to Detect Ransomware

The second most common type of malware incident is the notorious ransomware attack. According to the Verizon 2020 Data Breach Investigations report, the primary aim of a ransomware attack is “to disrupt operations badly enough and long enough that the organization will pay the ransom.” The...
June 12, 2020 | Ryan Brooks

How to Prevent Malware Attacks: 10 Security Tips

According to Verizon’s 2019 Data Breach Report, 28% of data breaches involve malware. This dangerous software threatens every organization and is becoming more common every day. Companies must work hard to prevent malware infections in order to: Protect sensitive information and critical...
November 28, 2019 | Ryan Brooks

Mitigating the Risk of Ransomware Attacks in the Public Sector

Ransomware attacks were on the rise around the world in 2019. In the U.S. alone, more than 620 government entities, public institutions, healthcare service providers, school districts, colleges and universities had their data held hostage. These relentless attacks have interrupted everyday life in...
October 12, 2017 | Pierre Dehombreux

Ransomware Survivor: 6 Tips to Prevent Ransomware Attacks

By Pierre Dehombreux, Director of Information Technology at Whiteriver Unified School District My name is Pierre and I am an IT director at Whiteriver School District in Arizona, U.S.  I am a recent ransomware survivor, and I’d like to share my story and the lessons I learned with you. Who We...
August 30, 2017 | Russell Smith

Quick Guide: How to Prevent Ransomware

This year, ransomware has been high on the list of the security issues giving CISO sleepless nights. Although ransomware attacks have been on the rise for some time, this year included an apocalyptic event: WannaCry infecting over 300,000 computers in 99 countries, including those of well-known...
Show more articles
...