Ransomware

Ransomware
Coronavirus Penetration Testing Phishing Ransomware

Five More Predictions for How Pandemic Will Change Cyber Security In Next Year

With the business world in a massive state of upheaval, corporate security professionals need to revamp their strategies and tactics to reduce the risks of cyber attacks. To help them make these changes, I am sharing ...

Coronavirus Malware Phishing Ransomware Social Engineering

Coronavirus – Cybersecurity Tough Love from Chris Roberts!

Let’s get real for a minute – like Chris Roberts real.  If you don’t know or know of Chris and you work in cybersecurity or information security, he is a good follow.  His posts are always on point, relevant, a...

Breach Information Security Phishing Ransomware Spear Phishing

Defending Against a Real World Cyber Attack

In the link below, Hiscox Insurance produced a short video detailing the business impact of a cyber breach.  It’s well done and in only 3 minutes, gives quite a visual representation of what a behind the scenes hack migh...

Information Security Phishing Ransomware

Mecklenburg County Ransomware Attack – 6 Steps to Protect Your Organization

The question is, if your company was compromised via a ransomware attack, would you pay the hackers to get the encryption key that would unlock your data?  The answer may not be that simple, as Mecklenburg County officia...

Information Security Ransomware

6 Steps to Take to Fight Ransomware

Beazley Insurance just released their Beazley Breach Insights report, which found that ransomware attacks more than quadrupled in 2016. What’s even more alarming is that they predict this number, already at an all-time h...

Information Security Malware Penetration Testing Phishing Ransomware

Rebyc Security’s Patrick Barry at North Carolina Technology Association (@NCTA) Tech Talk Live

In case you missed it, @Rebycsecurity recently participated in a panel for the North Carolina Technology Association Tech Talk Live (@NCTA)event in Charlotte, NC.  The panel broke down some of the key differences between...