Tech Insights

rss

Contributor Columns on Information Technology and Security

So Macs can be infected with malware. Who would have ever thought? The malware at issue here is the dreaded ransomware. Ransomware scrambles up your files, and the hacker at the helm says he’ll give you the cyber “key” in exchange for a handsome payment. Ransomware historically has primarily impacted ...

Cybercriminals know that the best way to get their claws on the next victim is to appeal to their emotions, not logic. There’s lots of scary things in life, and one is learning that your computer has been infected with a virus. If this happens, you’re now vulnerable to spending ...

We’re told to change our passwords often to minimize getting hacked. Now we’re told this is a bad thing. But not for any inherent techy reason. It’s because frequent password changing makes many people lower their guard when it comes to creating new passwords. They get lax and end up with ...

You may be putting your company at risk simply by hiring a new employee. Why? Because that person could have a hidden, malicious agenda. This is known as an inside threat, and it means that someone within your organization is planning or conducting activities meant to harm the company. There is ...

Cyber criminals have been attempting to extort money from individuals and companies for many years, and the latest attempt to take advantage of others is by using Ransomware as a Service, or RaaS. A ransomware virus infects a computer when a user clicks a link and unknowingly download a malicious ...

Disasters happen every day. Crashing hard drives, failing storage devices and even burglaries could have a significant negative impact on your business, especially if that data is lost forever. You can avoid these problems by backing up your data. Backing up means keeping copies of your important business data in ...

Everyone has received very obvious “phishing” e-mails: Messages in your in-box that have outrageous subject lines like “Your Account Will Be Suspended,” or, “You Won!” While some phishing attacks are obvious, others look harmless, such as those in a person’s workplace in-box, seemingly from their company’s higher-ups. Researchers point out that ...

There are numerous subspecialties within the booming cybersecurity field[i]. Here are some of the most in-demand professions: Cybersecurity Engineer: This is the all-around, jack-of-all-trades, go-to guy or gal of cybersecurity. For all intents and purposes, a cybersecurity engineer is a hacker – but a good one. Using their advanced knowledge ...

No bones about it, 2016 is sure to see some spectacular, news-chomping data breaches, predicts many in infosec. If you thought 2015 was interesting, get your seatbelt and helmet on and prepare for lift off… Wearable Devices Cyber crooks don’t care what kind of data is in that little device strapped ...

Companies have been struggling for years to keep cyber-attacks at bay. Cyberthieves are working faster than ever before to send out their malicious attacks, and it’s become increasingly difficult for companies to keep up. CNN reports that almost one million malware strains are released every day. In 2014, more than 300 ...

The Number One Menace to All Organizations
 

Learn more about how to protect your organization against this growing menace
https://info.knowbe4.com/ransomware-simulator-tool-its