Lockbit 3.0 Hits Japan’s Largest Trading Port

On the morning of July 4th, 2023, the Nagoya Harbor Transportation Authority in Japan had trouble accessing their central computer systems and discovered that they had been hacked by LockBit 3.0 ransomware. The ransom demand was received through an office [...]

Lockbit 3.0 Hits Japan’s Largest Trading Port2023-07-29T14:26:54-07:00

BlackSuit Ransomware Targeting Linux and Windows

A new ransomware strain that was discovered in early May 2023 has shown a strong resemblance to Royal ransomware. This new strain BlackSuit, primarily targets Linux systems and Windows. Further analysis from cybersecurity company Trend Micro, shows that BlackSuit and [...]

BlackSuit Ransomware Targeting Linux and Windows2023-07-03T11:49:05-07:00

Server Monitoring: Benefits and Challenges

What is Server Monitoring? Server monitoring is the process of tracking and observing the performance and health of computer servers and their associated resources. It involves collecting and analyzing metrics, logs, and events to detect any abnormalities and to [...]

Server Monitoring: Benefits and Challenges2023-06-07T10:47:25-07:00

Enhance Your Cybersecurity Strategy with Endpoint Detection and Response

What is Endpoint Detection and Response (EDR) and why is it important? Endpoint Detection and Response (EDR), is a security technology that helps organizations detect and respond to security threats (ransomware, malware, etc.) on endpoints such as computers, laptops, [...]

Enhance Your Cybersecurity Strategy with Endpoint Detection and Response2023-05-23T16:28:32-07:00

CISA’s Pilot Program Helps Protect Critical Infrastructure from Ransomware

Earlier this year, CISA (Cybersecurity and Infrastructure Security Agency) launched a new program to help protect critical infrastructure institutions by safeguarding their information systems from ransomware cybercriminals. The two main purposes of this new program, called Ransomware Vulnerability Warning Pilot [...]

CISA’s Pilot Program Helps Protect Critical Infrastructure from Ransomware2023-08-10T22:30:37-07:00

Protect Against Ransomware With Immutable Backups

One of the most effective ways to protect against ransomware attacks is to have immutable backups. Immutable backups are backups that cannot be altered or deleted, even by users with administrative privileges. This means that if your system is [...]

Protect Against Ransomware With Immutable Backups2023-03-27T16:10:42-07:00

Why Your Cybersecurity Strategy Must Include Multi-Factor Authentication

The cybersecurity industry is buried in unexplained and confusing terms and acronyms. Two important terms that everyone should know and understand are multi-factor authentication (MFA) and two-factor authentication (2FA). They are both security mechanisms designed to accurately identify a [...]

Why Your Cybersecurity Strategy Must Include Multi-Factor Authentication2023-02-16T13:33:27-08:00

The Social & Psychological Impacts of Ransomware

When a ransomware gang attacks, it’s not just a problem for IT professionals, it impacts everyone. A ransomware attack triggers a chain reaction. Not only is it damaging to the entity, but it can also impact its employees, third-party [...]

The Social & Psychological Impacts of Ransomware2023-02-20T20:29:10-08:00