blue cloud graphic on dark background with coding letters and number over the whole image

What’s the Connection Between Ransomware and Phishing?

On the surface, ransomware attacks and phishing emails may seem to have nothing in common. After all, ransomware involves encrypting all of the data on your network so you lose access to it unless you pay a “ransom.” Phishing emails, on the other hand, are a form of social engineering whereby cyber criminals pretend to be someone they’re not to trick network users into divulging sensitive information.

Read More ...
Man using technology and graphic

Cybersecurity Threat Landscape -Pt.1

There is no doubt that the Cybersecurity Threat landscape is changing on a daily basis.  It seems like that hardly one type of attack comes out, new variants of it are launched at a subsequent point in time. 

Read More ...

IIoT Environment

Introduction

There are many devices, computers, workstations, wireless devices, and even IT Infrastructures that are now interconnected amongst one another.  There is a technical term for all of this interconnectivity, and it is specifically known as the “Internet of Things”, or “IoT” for short.

Read More ...

Malicious Documents

Introduction

As we wrap up 2019, one of the most common threat vectors used by the Cyberattacker still continues to be Malware. 

Read More ...

Worst Cyberattacks – Pt.2

The Worst Cyberattacks In History – Continued

1. Stuxnet:

This is probably the most publicized Malware attacks of all time.  What was unique about this Cyberattack is that its main objective was to greatly curtail the nuclear weapon development program of Iran. 

Read More ...