If you’re reading this posting, odds are that you or someone you know is the victim of a ransomware attack. Ransomware continues to grow as a prevalent threat . The number of new ransomware families we saw in the first half of 2016 alone has already eclipsed the total 2015 volume by 172%. With ransomware attacks becoming more and more sophisticated and prevalent, we believe that the threat will potentially cause more damage going into the second half of the year.
This post is meant to tell you exactly what we think you should do if you’re looking at a ransomware screen. Most importantly, here’s what you shouldn’t do …. pay the ransom. I can’t emphasize that enough: don’t pay the ransom. Continue reading
Two years after the regulation was first announced, the progress is visible but it’s slow. As often happens with regulation, it’s going to take a whipping boy to understand the gravity of the situation for most organisations. One high-profile case of a company handing money over for non-compliance under the General Data Protection Regulation (GDPR) will be the required wake-up call the rest of the industry needs to get their act together. Continue reading
As previously discussed in part one, cloud services are a fact of life in most organizations today – whether you know it or not. When attempting to address this problem today there are three main areas where you should focus your efforts. Continue reading
Point-of-sale malware has become an infamous source of headaches for retail IT. Memory-scraping malware and POS skimmers especially have wreaked havoc on small and medium-sized businesses, including boutiques and restaurants, mainly as a way to steal customer payment data. Even large, global retailers such as Target have been negatively impacted by the malicious feats of POS hackers. Continue reading
In marketing and communication there’s a trend not to mention products too often, but rather focus on the benefits, the problems that are tackled, etc. We are all in favor, but that doesn’t mean you should neglect proper education and training.
In the coming months we will be sharing insights in three key Trend Micro solutions, starting with OfficeScan – that can defend you against ransomware – on April 15th. Just click here to sign up!
Data breaches have a pretty specific public perception these days. Media focus on cyber attacks resulting in the loss of private information has led many to believe that outside hackers are the only way companies can lose control over their data. While these events obviously need to be taken seriously, recent Trend Micro research has found that only one quarter of breaches can be linked to cyber criminals. Continue reading
Email has moved into the center of communications. This is especially true within the business sector, seeing as The Radicati Group discovered that the average employee sends and receives 122 emails every day. This digital means of discussion is incredibly convenient and quick, but it is far from a perfect system. Continue reading
Trend Micro researchers noted that the future of mobile tech in health care is bright. Wearable devices and technologies driven by the Internet of Things are beginning to contribute to a better health landscape. For instance, these wearables can track fitness levels and even blood sugar for those with diabetes, and they will soon be (or in some cases already are) able to track blood pressure, heart rate and respiratory rate, among other important metrics. Continue reading
Last year was a big year for cyber security – and not necessarily in a good way. A few high-profile data breaches made the news, according to Network World, including several that involved health insurance companies (e.g., Anthem and Premera) and one huge breach on an important federal government office (the Office of Personnel Management). The latter especially was cause for concern, as the confidential information of almost 22 million current and former federal employees was stolen, along with the biometric data of 5 million people. Continue reading