LinkedIn data breach, if you are a user take two minutes to read this
If you use LinkedIn take two minutes to read their posting Notice of Data Breach You may have heard reports recently about a security issue involving LinkedIn. We would like to make sure you have [...]
Ransomware and Phishing Awareness Training for your end-users
If you don’t treat network security as important, don’t expect your users to treat security as important. Irvine, CA - Ransomware and phishing threats are the most prevalent cyber-risk problem facing your organization today. Securing [...]
CryptXXX is ransomware that also steals your passwords and your Bitcoins
Most of my recent blogs are about ransomware. That is because ransomware is the most prevalent cyber threat today facing individuals, small and large businesses, governments and not-for-profits. No one is safe from this scourge.
Today I must tell you about a new one. Like Jigsaw, this new one called CryptXXX, is a game changer. Jigsaw was different from prior strains in that it immediately starts to delete your files just to show you that it means business. CryptXXX is different in that it introduces two new problems other than encrypting all your files and then demanding payment. Up until now ransomware has not actually breached your system and exfiltrated data. Sure you had a security incident, but it was not identified as a breach in the classic sense. Now with CryptXXX not only is your data held hostage, but now the culprits steal two new things from you. CryptXXX steals login names and passwords which puts all your systems, local and in the cloud, and any websites you frequent at risk. CryptXXX also steals your Bitcoins if you have any. The stealing of the Bitcoins is a particular insult because....
New ‘Jigsaw’ ransomware is insidious, deletes files exponentially in punishment
Beware of Jigsaw, the newest ransomware trojan. It does not wait for you to pay a ransom. Within the first 24 hours it deletes files and then accelerates the process exponentially to show you they [...]
Without IT process documentation, companies risk being held ‘hostage’ by IT
As cybersecurity breaches surge, it's important that company leadership know what IT is up to. Kevin McDonald explains why IT process documentation is a must-have best practice. It seems that not a day passes without [...]
Orange County Register Opinion Column on “Ransomware: Pay now or pay later”
Ian makes several very important points including, “Whether it is your home computer or a large organization’s network, ransomware does not care. It will block access to the computer, encrypt your data and if that computer has access rights to the network, then it will lock down the entire network and hold it all hostage.” Additional he says “The threat of ransomware will continue to grow because cybercriminals recognize it as a profitable business model and the online payment methods afford anonymity.”
If you want to read more about ransomware and how to protect you and your company, check out these links:
1) Attend free our live lunch and learn on How to Protect You and Your Company from Ransomware. Whether you have already gotten ransomware or have yet to be infected, this is a must attend event. In 90 minutes you will come away with a rich set of action items to be better prepared. Ransomware Lunch & Learn
2) Here is the Ransomware defense framework for P-D-R, Protect, Detect and Recover.
I am text block. Click edit button to change this text. Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.
Hello
