ransomware

IDG survey confirms application whitelisting is underutilized.

IDG Confirms Application Whitelisting is Underutilized

A recent survey by IDG confirms, application whitelisting is by far the most underutilized component of zero-trust technologies. What is Application Whitelisting? Application whitelisting only allows known trusted, and proven secure applications to run on the network. This is an effective means to cyber threat mitigation because no matter how many times malware evolves, it

IDG Confirms Application Whitelisting is Underutilized Read More »

Colonial Pipeline pays hackers, and then doesn't even use the decryption key.

Colonial Pipeline – The Perfect Example of Why Not to Pay

You’ve heard about it. The pipeline that was hit with ransomware, causing a major fuel shortage across the east coast. You also likely heard they paid the hacker’s demands. However, did you hear the rest of the Colonial Pipeline story? The End of the Colonial Pipeline Story Colonial Pipeline paid the ransom demands, after publicly

Colonial Pipeline – The Perfect Example of Why Not to Pay Read More »

Data exfiltration is a growing concern.

Data Exfiltration Isn’t New, But It’s a Growing Concern

The Lack of Education Data exfiltration is a growing cybersecurity concern. Back in 2017, a blog post on CSO outlined the horrors some parents in small towns were experiencing based on the attacks on their children’s schools. The hackers wanted money. Unfortunately, the schools weren’t paying up. Desperate for a new angle, the hackers reached

Data Exfiltration Isn’t New, But It’s a Growing Concern Read More »

Ransomware Gang Emails Victims - Will the #ApplicationWhitelistingMatters movement drive change?

Ransomware Gang Emails Victims, But What Does That Actually Achieve?

Did You Hear? Ransomware Gang Emails Ransom Victims. Maybe you haven’t read it, but on Monday, Krebs on Security reported that ransomware victims are receiving emails from the hackers. Let’s make sure we define “victims” in this sense. The people receiving the emails aren’t the companies that have been breached. Instead, the hackers are reaching

Ransomware Gang Emails Victims, But What Does That Actually Achieve? Read More »

Malware, ransomware and viruses infecting schools K-12.

Broward County Florida School District Hit With Outrageous Ransomware Demands

Broward County school ransomware attack. Broward County Public Schools was hit with possibly the largest ransom demand to date on a school system. The hackers demanded a $40 million payday to not release student and teacher information. District officials said they are confident they caught the breach in time. They say no information was accessed.

Broward County Florida School District Hit With Outrageous Ransomware Demands Read More »

Rob Cheng Discusses Cybersecurity Careers and More

Creating Curriculum for HGTC Rob Cheng, PC Matic’s enigmatic CEO, sat down again with Liz Calloway today. First, they discussed the Horry-Georgetown Technical College’s new cyber certification program. Rob is particularly excited about the jump into healthcare IT focused cybersecurity. It’s long overdue. Healthcare is one of the most vulnerable cybersecurity landscapes. As we know,

Rob Cheng Discusses Cybersecurity Careers and More Read More »