Enterprises, small companies and everyone in between is adopting cloud-based tools and environments for their business and personal needs. RightScale’s 2016 State of the Cloud report found that 82 percent of enterprises were using a multi-cloud strategy, meaning they are using the infrastructure services of more than one cloud provider. In addition, according to projections made last year by Intuit, 78 percent of small businesses will be fully in the cloud by 2020. By saving data in virtual environments, companies are becoming more flexible and saving money on their IT infrastructure, allowing them to do better business and enhance revenues in the long run. Continue reading
If you’re reading this posting, odds are that you or someone you know is the victim of a ransomware attack. Ransomware continues to grow as a prevalent threat . The number of new ransomware families we saw in the first half of 2016 alone has already eclipsed the total 2015 volume by 172%. With ransomware attacks becoming more and more sophisticated and prevalent, we believe that the threat will potentially cause more damage going into the second half of the year.
This post is meant to tell you exactly what we think you should do if you’re looking at a ransomware screen. Most importantly, here’s what you shouldn’t do …. pay the ransom. I can’t emphasize that enough: don’t pay the ransom. Continue reading
In many ways, the internet has made the world smaller. Communication between people on different continents is now instantaneous. Files and information can be rapidly shared between disparate web users, and edited in real time. Events that occur on one side of the globe can be widely read about on the other side within the amount of time it takes to type it out and post it online. It’s almost like a human super power – while we cannot physically travel at the speed of light, our messages, our photos, our videos and our ideas quite literally can. Continue reading
Try as they might, companies are often unprepared when it comes to the security of their IT infrastructure. While organizations have to do everything in their power to plug up every single vulnerability in their systems, hackers only have to find one to be successful in their attack. What’s more, the wide variety of techniques cyber criminals have to choose from means that businesses just can’t predict how they’ll be hacked. Continue reading
It’s always gratifying to notice you could predict the future accurately. but when it comes to predict the growth of cybercrime, it is rather a mixed feeling. Nevertheless our prediction that the number of ransomware incidents would increase spectacularly turned out to be an understatement rather than an exaggeration. Continue reading
PoS (Point of Sale) fraud and malware used to be little more than keylogging and screenscraping: retrieving credit or debit card details by registering the information that the customer enters on the keyboard and/or that appears on the screen. Nowadays the cybercriminals targeting PoS systems have a more elaborate and more advanced set of weapons available.