<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=885880844953016&amp;ev=PageView&amp;noscript=1">
Posted by Daniel Petrillo on April 8, 2021

With attacks increasing by 140 percent between 2018 and 2019, the threat from ransomware was growing long before the COVID-19 pandemic began. Last year, however, thanks to a perfect storm of unfortunate circumstances, the trend line for ransomware growth has gone vertical.

Read More
Posted by Daniel Petrillo on March 24, 2021

Over 30 years ago, a disgruntled researcher unleashed the first noted ransomware virus, the “Aids Trojan.” Distributed on 20,000 floppy disks marked “AIDS Information — Introductory Diskettes'' using hijacked mail subscriber lists to the World Health Organization AIDS conference, the Aids Trojan encrypted hard drives and directed victims to post ransom money to a P.O. box located in Panama. However, the Aids Trojan had a design failure — it used simple symmetric cryptography, which meant that it was possible to extract the decryption key from the code of the Trojan. 

Read More
Posted by Daniel Petrillo on March 18, 2021

Ever since the Morris Worm infected 10 percent of internet-connected computers in 1988, endpoint security has become a critical asset for organizations and endpoints themselves a top target for threat actors. However, in recent years, the arms race between cybercriminals and businesses has reached a fever pitch. Even though spending on cybersecurity solutions has increased exponentially, the damage done by cybercrime has not diminished. Estimates now show that by 2025 global cybercrime will cost over $10 trillion per year — equivalent to half the United States' current GDP. 

Read More
Posted by Daniel Petrillo on March 3, 2021

When it comes to cybersecurity, more investment doesn't necessarily mean more protection. Even though the cybersecurity market grew by over 10 percent annually before 2020, last year still saw a record amount of damage done by data breaches. While the threat landscape has undoubtedly evolved in recent years, the array of defense solutions available to organizations has multiplied too.

Read More
Posted by Daniel Petrillo on February 19, 2021

Microsoft Defender Antivirus suffers from a perception problem. For the first decade of its existence, starting with its 2006 release, Defender was a much-maligned piece of software that no business would use to protect its endpoints. That’s no longer the case. Defender has today evolved into a competent and competitive endpoint security platform backed by one of the world’s largest companies. This improvement didn’t happen by accident. 

Read More
Posted by Daniel Petrillo on January 28, 2021

As the fallout from this past December's SolarWinds cyberattack settles, it is clear that the hack didn't just compromise federal organizations. The SolarWinds attack now appears to have infected government networks from federal departments all the way down to state and local government bodies. That a state-sponsored attack would proliferate beyond its initial targets is no surprise. However, the fact that this attack impacted all government levels also highlights a broader trend. State and local government networks are no less of a target than their federal counterparts for cybercriminals. 

Read More
Posted by Daniel Petrillo on January 21, 2021

Before COVID-19 started making headlines earlier this year, government departments might have been considered unlikely candidates for making large scale remote working a success. However, with service levels maintained across the public sector despite challenging circumstances, this assumption has been thoroughly disproven. 

Read More
Posted by Daniel Petrillo on January 14, 2021

For the first two decades of the internet age, from the early 1990s to the 2010s, high-quality antivirus software that blocked the most malware came at an appropriate premium. After all, the endpoint was—and still is—of the primary attack vectors for cyber threats, so it stands to reason that antivirus could charge a premium to secure your endpoint. 

Read More
Posted by Daniel Petrillo on December 3, 2020

Although far from new in technological terms, the ubiquity of public and hybrid cloud use is a relatively recent phenomenon. Driven in part by the current COVID-19 pandemic, it would be difficult to find an organization that isn't relying on a cloud-based service right now.

Read More
Posted by Daniel Petrillo on November 19, 2020

How do you steal something that doesn’t exist? That’s the thinking behind the widespread fallacy that virtual desktop infrastructure (VDI) is more secure than physical desktops.

Read More

Subscribe to our blog

Stay in the loop with industry insight, cyber security trends, and cyber attack information and company updates.

New call-to-action

Search Our Site

    Recent Posts

    Posts by Tag

    See all