4 Ways to Protect Yourself: Ransomware is Inevitable

Author(s):

Manish Mandal, Product Marketer , ManageEngine

Ransomware Attacks

When it comes to ransomware attacks, the window to react and remediate these impending attacks is very small. By the time this attack is recognized, it may be too late to spring into damage control mode. Take the WannaCry ransomware attack, for instance—once it was deployed, it took eight hours to develop the kill switch. … Read more

Secure Your Organization from the Rising Wave of Device-related Cybersecurity Attacks

Author(s):

Sathya R, Product Specialist, ManageEngine

Device-related Attack - Role-based Access Control

In any given organization, chances are, a diverse array of peripheral devices are in use.  These can include ubiquitous equipment such as keyboard and mouse combos, tools utilized for convenience such as USB flash drives as well as niche equipment for the completion of specialized tasks. However, as the scope and popularity of these devices … Read more

Cybersecurity Acronyms – A Practical Glossary

Author(s):

Lauren Abshire, Director of Content Strategy, United States Cybersecurity Magazine

Cybersecurity Acronyms

Whether you are a cybersecurity professional, an end-user, just starting in cybersecurity or interested in the field, this cybersecurity acronym practical glossary is for everyone. Cybersecurity acronyms can be confusing, especially with some acronyms having dual meanings – think IP address and IP for Intellectual Property – and some acronyms having very slight differences. Here, … Read more

,

Companies Must Prepare for Escalating Ransomware Attacks and Threats

Author(s):

Noman Ansari, Senior Writer, Malwarebytes

Ransomware Attacks - Cybersecurity Software

There certainly have been some dangerous ransomware attacks in the recent past. In 2017, the WannaCry ransomware attack exploited a security flaw in Microsoft Windows OS to hold over 200,000 computers hostage worldwide. The hospitals that were struck by WannaCry had to cancel essential procedures, including emergency services. After postponing thousands of appointments, the costs … Read more

Cyber Self-Defense Is Not Complicated

Author(s):

A.J. Nash, Vice President of Intelligence,

Cyber Self-Defense

Whether it be texts that include personal content not meant for public consumption, emails, hard drives, cloud storage containing sensitive business information, or the endless supply of finance transaction data that most of us pass across the Internet daily, few people in the modern world are immune to the threat of a cyber-attack. Hence, the importance … Read more

Ransomware: Harbinger of the Future

Author(s):

Scott Blough | Associate Professor of Criminal Justice & Security Studies at Tiffin University, ,

Ransomware

The recent spate of ransomware attacks on Texas municipalities is a harbinger for the future of cyber-crime. In fact, according to various news sources, as of August 23rd, 2019, at least 22 municipalities in Texas have been affected by this recent ransomware outbreak. Although not all of those affected have gone public, there have been … Read more

5 Cyber Threats You Should Be Aware Of

Author(s):

Emma Megan, ,

A data breach can hit any business at any time. Whether it is sensitive information that the company must protect to maintain its competitive advantage or documents necessary to meet industrial or government’s regulatory requirements, all data must be protected. The fallout of a data breach has a significant impact on any business. Data breaches may include … Read more

Why Software Architecture Matters in Foolproof Cybersecurity

Author(s):

Judy Robinson, ,

Software Architecture

The long-term success of any business or digital venture depends solely on a strong software architecture – one that has robust performance and is equipped with foolproof cybersecurity. In simpler terms, software architecture forms the basis of the development of an enterprise. Therefore, the main source acts as a guideline to shape the future of … Read more

Denial of Service: Access Denied

Author(s):

Patrick Putman, ,

Denial of Service, girl at laptop, access denied

As an internet user, you have likely experienced an interruption in service at some point. Maybe your favorite website was unavailable. Or perhaps your internet service was completely down. Sometimes this happens due to scheduled maintenance. Other times it happens due to hardware or software issues. However, interruptions are occasionally the result of what is … Read more