About Oli Thordarson

This author has not yet filled in any details.
So far Oli Thordarson has created 144 blog entries.

Microsoft Monitoring Over 100 Ransomware Threat Actors

Microsoft recently disclosed that they are monitoring over 100 different threat actors utilizing 50 unique ransomware families to attack businesses and organizations across the world. These attacks have been increasing in frequency, severity, and sophistication. The threat actors behind [...]

Microsoft Monitoring Over 100 Ransomware Threat Actors2023-08-10T22:32:36-07:00

Why Your Cybersecurity Strategy Must Include Multi-Factor Authentication

The cybersecurity industry is buried in unexplained and confusing terms and acronyms. Two important terms that everyone should know and understand are multi-factor authentication (MFA) and two-factor authentication (2FA). They are both security mechanisms designed to accurately identify a [...]

Why Your Cybersecurity Strategy Must Include Multi-Factor Authentication2023-02-16T13:33:27-08:00

The Social & Psychological Impacts of Ransomware

When a ransomware gang attacks, it’s not just a problem for IT professionals, it impacts everyone. A ransomware attack triggers a chain reaction. Not only is it damaging to the entity, but it can also impact its employees, third-party [...]

The Social & Psychological Impacts of Ransomware2023-02-20T20:29:10-08:00

“Pig-Butchering” Crypto Investment Scam

In recent news, the FBI sent out alerts of a new cryptocurrency investment scam that’s sweeping America, the “pig-butchering” scam. Originating from China, criminals behind this cryptocurrency scheme have expanded their operations to Indonesia, Cambodia, Laos, and Malaysia. Researchers discovered [...]

“Pig-Butchering” Crypto Investment Scam2023-02-20T20:37:48-08:00

Beazley’s $45 Million Cybersecurity Bond: A Solution for First-Party & Third-Party Cyber Losses

Beazley, a leading specialist insurer, has recently launched a catastrophe bond for cybersecurity and ransomware breaches. This $45 million bond is designed to provide financial protection for organizations that suffer a significant cyber-attack resulting in a loss of $300 [...]

Beazley’s $45 Million Cybersecurity Bond: A Solution for First-Party & Third-Party Cyber Losses2023-01-19T14:08:36-08:00

Impact of Cyber Attacks on Water Infrastructure

We hear a lot about critical infrastructure and how important it is to secure it. But few categories of infrastructure are more critical to human existence than water and wastewater processing and transport systems. Next to the air we [...]

Impact of Cyber Attacks on Water Infrastructure2023-01-31T15:06:09-08:00

Why Healthcare Entities Should Invest in Robust Cybersecurity

Healthcare organizations are under attack from all sides of their businesses. We are seeing a major increase in directed ransomware and other cyber-attacks on a variety of healthcare organizations and their partners. These attacks are crippling operations, while also [...]

Why Healthcare Entities Should Invest in Robust Cybersecurity2023-01-12T20:03:08-08:00

Infrastructure Monitoring Solutions: Tool vs Service

The backend system of every organization is complex and unique, so it can be challenging to find the right IT infrastructure monitoring solution that works with one’s network and systems. There are two main ways to implement infrastructure monitoring: [...]

Infrastructure Monitoring Solutions: Tool vs Service2022-12-30T13:46:04-08:00

Why Infrastructure Monitoring is Critical to Your Business

What is Infrastructure Monitoring? Infrastructure monitoring refers to the collection and review of information on infrastructure components to measure performance and efficiency. It gauges how healthy a system is by collecting the performance information and data from servers, databases, [...]

Why Infrastructure Monitoring is Critical to Your Business2023-01-17T11:17:50-08:00

Emergency Help for Fortinet Ransomware & Cyber Breach Recovery

FortiOS Ransomware and Cyber Breach Vulnerabilities are Back! Fortinet is again the target of hackers, ransomware hackers specifically. Fortinet’s big problem is a zero-day buffer overflow vulnerability in FortiOS. We have seen that it is already leading to breached [...]

Emergency Help for Fortinet Ransomware & Cyber Breach Recovery2023-02-20T20:58:50-08:00