Ransomware operators are now frequently operating with a one-two punch: through the so-called trend of "big game hunting", once they have infiltrated a network, they move laterally through it with the aim of gaining as many access points as possible, maximizing the percentage of the environment under their control. After having operationally impacted a large percentage of server-side infrastructure, that's when they deploy the ransomware message.
What do zombies and malware have in common? Both are generally created by an infectious virus, spreading quickly and wreaking havoc. Work-from-home offices can be especially vulnerable, as they are often not given the same protections as your organization's network. So what should do *before* zombies—or malicious virus attacks—actually happen?
Research by ZDNet has shown that tens of thousands of new unique coronavirus-themed domains are being created on a daily basis. Unfortunately, research also points to 90% of those webpages as being scam sites, with the most likely purpose that of distributing malware.
More worrisome news? Ransomware has shot up anywhere from 72%-105%. Brute-force attacks are up 400%.
Think of proactive and reactive cybersecurity methods as before and after. Reactive strategies should be a component of your defense against hackers, while proactive strategies should form the foundation of your cybersecurity. Both are critical to your company’s defense.
There is a war going on. A cyberwar, to be exact, with companies big and small under attack daily. As managed IT specialists, we spend a good portion of our time fighting against the villains of the web to keep people and corporate assets safe. We believe knowledge shared is knowledge gained in this fight. That’s why we decided to enhance our biannual TechExpo offerings with a session specific to cybersecurity and ransomware.
When you reuse the same passwords across the internet, all it takes is one hacked account for hackers to make the jump and access your email, bank, and other important accounts. The solution can be as easy as a password manager. But which one?
1. Hook up to a network that you know: Free Wi-Fi is tempting, but be sure that you consider who is providing the connection. Public connections at the local coffee shop are usually unsecured and leave your machine open to outsiders. While these networks provide a convenience, there are risks to be aware of.