When Ransomware Attacks Seem Inevitable, What Can IT Teams Do?

The possibility of their business falling victim to a cyberattack has always kept IT teams up at night, but today’s threat landscape is reaching new levels of sophistication. For example, new acoustic-based ...
confidential computing, ecosystem, security, hackers cloud cloud security

Cloud-Based File Systems as a Ransomware Defense

Ransomware is an unfortunate and unavoidable fact of life for businesses today. Attackers are escalating their attacks on organizations of all types and sizes across the globe. In 2021, there were three ...
Security Boulevard
Which Data Do Ransomware Attackers Target for Double Extortion?

Which Data Do Ransomware Attackers Target for Double Extortion?

Double extortion is one of the most prevalent ransomware tactics today. The attackers first exfiltrate sensitive information from their target before launching the ransomware encryption routine. The threat actor then demands a ...
CISA security tools Microsoft 365 Google

Staying Ahead of Ransomware With the Cloud

According to a report from Check Point Software, there were 93% more ransomware attacks in the first half of 2021 than during the same period last year. Palo Alto Networks’ Unit 42 ...
Security Boulevard
Junk-gun ransomware Sophos

Protecting Active Directory With Viable Backups

The primary recovery concern after a ransomware attack is the health of the core infrastructure. Before recovering any environment, it is crucial to confirm the viability of backups and whether there is ...
Security Boulevard
cybersecurity CSRB cyberresilience Information security architecture

Cyberresilience: Your Data Insurance Policy

In the wake of the Colonial Pipeline hack, businesses all over the world are getting a very loud reminder that they could be next to be compromised by a ransomware intrusion. For ...
Security Boulevard
cybersecurity passwords LastPass Ransomware Data Breach Notifications: Too Complex To Understand

Can Your Data Protection Software Recover from Modern Ransomware?

Your nightmare has come true. Your organization was just attacked by ransomware. They have crippled your networks, corrupted your Active Directory, encrypted business critical documents, and disabled production databases. Now the recovery ...
Security Boulevard
Ransomware Attacks are Evolving: What You Need to Know

Ransomware Attacks are Evolving: What You Need to Know

One look at all the ransomware attacks from the past few years, and it’s clear that crypto-malware actors are attempting to maximize their financial gain. We’ve observed these threat groups using multiple ...