Rise of the Shadow Hacker: Cisco’s Threat Assessment

Ransomware, domain shadowing and malvertising are just a few of the menacing terms you’ll need to get familiar with in order to protect your network in 2015. Cisco’s 2015 Midyear Security Report is out and it’s just the sort of reading that could give any chief information officer nightmares. The 41-page report confirms every security professional’s greatest fears: the bad guys are getting sneakier and our general ability to stop them is lagging dangerously behind.

Read more

The Scourge of Ransomware in 2014

The landscape of malware has been forever changed: in 2013, we witnessed the rise of ransomware. It feeds on people’s lack of security, lack of backup, and fear of loss—a perfect storm of malicious intent. The “success” of CryptoLocker ransomware means 2014 is sure to bring a plethora of copycat ransomware to bear against us. So, what can we do to protect our data?

Read more

The Click That Changed Emily’s Business

As you may recall from Part I of this series, Emily is the sole owner of a small business. Like many computer users, she has heard a little about the need to keep information secure—especially customer information—so she uses a free antivirus software program. But, there’s more to protecting data than that.

Read more