Think of all the valuable data your PC contains (pictures, files, invoices, contacts, etc). Now imagine losing all of that data Virus’ are still a thing but you should be more worried about ransomware, worms and all of the other digital creepy crawlies roaming the net looking to make you their next victim. Go read… Continue reading How to protect your PC from infection
In an uncertain world where kidnapping for ransom is an all too common occurrence, many hostage negotiators use the no-concession policy. They justify this position by explaining that paying a ransom makes it more likely that the perpetrators will try it again and often times the ransom is used to fund illegal or terrorist organizations.… Continue reading Companies buying bitcoin to prepare for cyber extortion
We had lower than normal SPAM numbers for the last couple of quarters but the evil scourge of the internet is back with a vengeance. Company CISOs and personal users probably noticed a rise recently of emails containing variants of the locky ransomware (encrypting) malware. The number of SPAM emails containing malware reached an all… Continue reading Locky Ransomware is king of SPAM emails
“The Health Insurance Portability and Accountability Act of 1996 (HIPAA) is a law that was created to protect millions of working Americans and their family members with medical problems. ” — American Cancer Society Most working professionals have an association they can call their own. Dentists have the American Dental Association. The ADA represents 159,000… Continue reading Would you like some malware with your dental cleaning?
2014 was the year of the hack. The year of the spectacular hack. You know this because these major incidents were reported in your run of the mill 6PM news show (not just the tech press). As we start a fresh new year, what can we expect? This isn’t your father’s malware Virus’ and malware… Continue reading 2015 will be the year of targeted stealthy malware
This blog is a hobby and in my day job (as the Chief Information Security Officer of a major international company) I see all kinds of attacks and malware. A considerable amount of infections are caused by users who run files that subsequently infect your machine. Doing so is as foolish as having unprotected sex.… Continue reading Scan that file
First go here and read my article on the 3-2-1 backup rule. There are 2 types of backups: Offline backups Online backups An Offline backup is simple, it is an external hard disk or USB key you use to periodically keep an extra copy of your data. As an example you plug it in… Continue reading Going Paperless Part 5 – Backing up your data