Your search found 44 result(s) for the term(s) ransomware

Ransomware Refresher: 5 Best Practices for Fighting Today’s Biggest Cyber-Threat

GettyImages_459434713
  • October 17, 2017
  • Print This Post
Ransomware, a piece of malware that blocks access to data and/or systems until a sum of money is paid, is the number one cyber-threat facing business organizations today, per the “2017 SANS Data Protection Survey” released last month. Nearly half of the frontline cybersecurity professionals polled by the SANS Institute,

Ransomware: A Cyber-Disaster Threatening Your Business Continuity

phishing
  • October 3, 2017
  • Print This Post
Nothing focuses business leaders on Business Continuity (BC) and Disaster Recovery (DR) measures more than a natural disaster. Given record-breaking events such as Tropical Storms Harvey and Irma, the heightened attention is understandable. When surge currents lap at your door, the need for urgent, immediate response hits businesses in the face

WannaCry Ransomware: Be Aware

ransomware security alert
  • May 16, 2017
  • Print This Post
Everyone’s talking about WannaCry, the new ransomware attack that has affected more than 200,000 users and businesses in 150+ countries. This malicious software is particularly aggressive and can spread rapidly throughout an organization crippling the business. Strong IT security is a combination of technology, process, and education all of which

How Business in the Healthcare Space Can Vaccinate Against Ransomware

Virus attack
  • February 28, 2017
  • Print This Post
A 2016 survey by Malewarebytes and Osterman Research suggests that an average of 4000 ransomware attacks occurred each day last year, an increase of 300% over 2015. “From a business perspective, the threat of ransomware will be the most disruptive cyber threat in the year ahead (2017),” Thomas Fischer, a

How to Lock Out Locky, the Smartest, Nastiest Ransomware Variant (So Far, Anyway)

Lock. Internet Security
  • April 14, 2016
  • Print This Post
Extortionists have again stepped up their global assaults, this time unleashing an especially elusive and destructive bug called Locky. It didn’t take long for February’s large-scale attack to claim victims, including medical facilities in California and Kentucky. Seasoned IT pros will recognize Locky’s malicious attack-mode, which mimics the poisoned document

Ransomware 2016: A Warning and a Remedy

ThinkstockPhotos-467073352
  • December 17, 2015
  • Print This Post
If Intel’s predictions are accurate, it’s not if your organization will fall victim to ransomware in 2016 but when. In the company’s latest Threats Predictions Report, security experts expect ransomware attacks to increase in frequency, sophistication and scope, which is unwelcome news, considering that users already click about one of

Rebuff Ransomware with 3 Simple Security Steps

ThinkstockPhotos-469956178
  • August 13, 2015
  • Print This Post
According to a recent alert from the FBI’s Internet Crime Complaint Center (IC3), CryptoWall – a variant of the CryptoLocker ransomware – cost U.S. businesses more than $18 million since April 2014. (Ransomware restricts access to the computer system that it infects and then demands a ransom be paid to

Cryptolocker: Avoid Ransomware with Healthy Paranoia

Cryptolocker
  • June 17, 2014
  • Print This Post
Cybersecurity firms have reported to ITinflections a recent increase in Cryptolocker traffic. Cryptolocker is Ransomware, a class of malware that restricts access to the computer system that it infects and then demands a ransom paid to the creator of the malware in order for the restriction to be removed. As

4 Reasons Healthcare Providers Should Update HIPAA Security Assessments–Now

hipaa compliance
  • August 30, 2017
  • Print This Post
While the Health Information Portability and Accountability Act (HIPAA) has been in place for years, healthcare providers are still debating their need for compliance. One pervasive misconception is that conducting a HIPAA security risk analysis is optional for small providers. The fact is that every health practice is subject to

6 Must Have IT Security Policies to Safeguard Your Business

safeguard SMB
  • July 27, 2017
  • Print This Post
What better way to introduce the second installment in our IT Policy Primer series, IT Security Policies and Framework, than drawing from that wellspring of corporate wisdom, Dilbert. In an episode of the long-running satirical strip, Dilbert’s pointy-haired Boss ambles officiously into the bespectacled worker’s cube to announce the creation
Need Help with your IT?

Find a Location
Near You.

Gain
weekly
insight

into the evolving world of IT for business.
Subscribe now.

Follow Us
Friend me on FacebookFollow me on TwitterFollow my company on LinkedInRSS Feed

Follow us on Twitter

About

ITinflections is a blog that covers a wide range of technology-based articles IT in the workplace, focusing on small- to medium-sized businesses.

If you’re looking to improve your company’s productivity through the effective use of technology, enjoy ITinflections, the blog about technology for business.