Stay Cyber Aware: 5 Ultimate Cyber Security Strategies

October is National Cyber Security Awareness Month. Netwrix supports the collaboration initiative of the US government and the IT industry and publishes 5 ultimate cyber security strategies that IT managers should keep in consideration to ensure their companies’ safety.  Implementation of these security practices gives you control over the IT infrastructure and allows you to respond … Continued

Shadow IT: Bring it into the Light [Infographics]

Shadow IT is a growing menace for IT departments worldwide. Take a look at the infographics below to have a better understanding of this threat and how you can minimize your risk. Source: 2016 Netwrix Visibility Survey   

7 Ransomware Myths Busted

Of today’s cyber security threats, ransomware is a modern scourge. Even though it has made a number of headlines in the past couple of years, ransomware is still surrounded by myths. Dispelling those myths is one of the key factors of developing an effective information security strategy. Here are the top seven ransomware myths, busted: … Continued

Ransomware: Stages, Reasons and First Actions [Infographics]

Ransomware is one of the fastest growing classes of malicious software. In recent years, ransomware has evolved from a simple lock screen with the ransom damage into far more dangerous variants, such as crypto-ransomware. Take a look at the infographics below to have a better understanding of this growing plague and how you can mitigate your risk. You may be … Continued

SysAdmin Magazine: Help! Ransomware Attack!

Ransomware is everywhere — that insidious threat that encrypts your precious documents and other files and holds them hostage until you pay a substantial sum to an anonymous third party. Here is special edition of SysAdmin Magazine that will be your handy guide in fighting  against  ransomware attacks. Contents of August issue of the SysAdmin Magazine: Quick Tweaks to Prevent Ransomware … Continued

Defending Against Crypto-Ransomware Guide

Ransomware is one of the fastest growing classes of malicious software. In recent years, ransomware has evolved from a simple lock screen with the ransom damage into far more dangerous variants, such as crypto-ransomware. 1. What is  Crypto-Ransomware Unlike traditional malware, crypto-ransomware doesn’t steal information. Instead, it encrypts a victim’s documents, spreadsheets, pictures, videos and other … Continued

3 Quick Tweaks to Prevent Ransomware Attacks

Ransomware is everywhere — that insidious threat that encrypts your precious documents and other files and holds them hostage until you pay a substantial sum to an anonymous third party. Fortunately, there are measures you can take to reduce the likelihood of an attack. Here are three tweaks you can make to mitigate this threat. … Continued

Ransomware Protection Using FSRM and PowerShell

While the FBI continues to investigate the MedStar attacks and a series of other recent ransomware attacks, I decided to describe a case from my own experience when I received an encrypted file and opened it. What steps should I have been undertaking to protect my system from file-encrypting malware?   Background Well, I received … Continued