Simon Says… Go Phish

Simon Says… Go Phish

We’ve all played Simon Says at some time in our childhood, or later on with our own children. The rules are quite simple. The leader of the game calls out a simple command that the others must perform. The only catch, is they are not to comply with the command...
Ransomware is No Game… or is it?

Ransomware is No Game… or is it?

Ransomware detection and elimination techniques have improved significantly over the past few years. Software is available now that will dramatically increase your chances of staying safe. This is not to say the war on Ransomware is being won. On the contrary,...
The 4th Ransomware Defense Layer

The 4th Ransomware Defense Layer

  Since 97% of all successful ransomware attacks begins with a phishing campaign, email workflow must be your primary focus. Think of your Ransomware protection strategy in terms of concentric layers. Each layer represents a different tactic or tool for finding and...
Anatomy of a Phish Attack

Anatomy of a Phish Attack

Criminals are constantly improving the quality of their phish attacks. It used to be fairly easy to spot one by the poor spelling or bad grammar. Today the clues are much more subtle. On the face of it these emails look quite legitimate. They use your real name,...
7 Reasons for the Rise in Ransomware Attacks

7 Reasons for the Rise in Ransomware Attacks

The obvious answer is that it works. And that its profitable. However, technology is slowly eating away at older sources of cybercrime revenue. It was not so long ago that the target of hackers was credit card information, and personal information such as S.I.N. or...