How to Respond to (and Prevent) Ransomware Attacks

How to Respond to (and Prevent) Ransomware Attacks ? In our previous blog post, we defined ransomware and identified common ways that hackers attempt to deliver ransomware attacks. In this post, we will discuss options to respond to and prevent ransomware attacks. Even large organizations can be the victim of a ransomware attack as these […]

What is Ransomware and How Do Hackers Target Their Victims?

What is Ransomware and How Do Hackers Target Their Victims? Ransomware is malware, a form of malicious software, that infects computers, encrypts computer files, and holds computer systems hostage until a fee/ransom is paid to the attacker to regain access to their encrypted network. In a ransomware attack, the users’ computers are locked by the […]

ASSESSING YOUR PHISHING RISKS — WHAT METRICS SHOULD YOU RELY ON?

ASSESSING YOUR PHISHING RISKS — WHAT METRICS SHOULD YOU RELY ON? There are lots of phishing awareness programs dedicated to giving employees the tools they need to recognize phishing scams. To prove their program’s effectiveness, companies often highlight their click rate. But how much is the click-rate alone telling you about your organization’s phishing risk? […]