
BACKGROUND IMAGE: iSTOCK/GETTY IMAGES
Containing ransomware outbreaks now a top infosec priority
-
Article
Are computer worms taking over the earth?
While worms – self-replicating computer programs that deliver malware to target computers – are hardly new, they also seem to be the future. Read Now
-
Article
NotPetya ransomware does irreparable damage to files
Victims of the major ransomware hack known as NotPetya find that -- unlike with other ransomware -- their files are impossible to restore. Read Now
-
Article
NotPetya tops list of most destructive ransomware attacks
NotPetya, the "nastiest" ransomware attack of 2017, and other similar ransomware hacks, have caused unprecedented damage to businesses, infrastructure and users, say threat researchers. Read Now
-
Article
New malware raises fears of third global ransomware attack
A bogus Adobe Flash update ransomware attack similar to WannaCry and NotPeya hit organizations in Russia, Ukraine, Turkey, Bulgaria and Germany. Read Now
Editor's note
Ransomware outbreaks are rampant and once you're a victim, it means the bad guys already have your data. So, the obvious first question is how to not be a victim. The second is, if it's too late and you've suffered a ransomware hack, how do you prevent the attackers from using it maliciously?
This guide is a collection of expert analysis and advice on the current state of the ransomware threat and what infosec pros can do in the event their company suffers a ransomware hack.
1How ransomware hackers manipulate end users
A major factor in the spread of ransomware is the use of innocent end users to spread the virus. Learn how hackers widen ransomware outbreaks via social engineering techniques and discover what infosecs can do to stem them.
-
Article
Employees have enough to worry about with social engineering
What security controls best ensure a safe working environment? Expecting employees to be the first line of cyberdefense isn't realistic or fair. Read Now
-
Article
Deadly embrace: Social engineering attacks online personas
How far will attackers go to plan social engineering attacks? Nick Lewis explains the progression of threats and how it's changing the way we monitor social media. Read Now
-
Article
'Deception in the Digital Age': The variety of cyber scams
Social engineering is a digital sleight of hand used in a variety of cyber scams like phishing, watering hole attacks and scareware. Read Now
-
Article
Teach customer service staff to spot social engineering attacks
Social engineering emails regularly target customer service staff, lead to the spread of malware. Expert Nick Lewis explains how to identify and prevent these attacks. Read Now
2How to fortify against a ransomware outbreak
Ransomware outbreaks can be scary, but they don't mean your systems are defenseless. Learn what tools exist to prevent a ransomware attack -- you may discover you have tools already on hand that are effective against ransomware as well as the threat they were originally purchased for. If the worst happens and you suffer a ransomware hack, there are still solutions for lessening the impact; what's important is that you plan now.
-
Article
A continuity checklist to protect against ransomware
Planning ahead is essential to ensure protection against ransomware. Set up your business continuity and disaster recovery plan and save your business money and time in the event of an attack. Read Now
-
Article
Can WannaCry decryptor tools work on other strains?
Researchers created WannaCry decryptor tools after that ransomware's outbreak. Expert Matthew Pascucci explains how they work -- and if they work on other strains of ransomware. Read Now
-
Article
What does the NIST suggest for ransomware recoveries?
Learn what you'll need if ransomware strikes and you must launch a recovery effort. Expert Judith Myerson looks at the latest NIST recommendations for enterprises. Read Now
-
Article
Tools to fight the ransomware scourge
Learn all about ransomware prevention tools you need to consider now, and how to perfect the tools your company already owns. Read Now
3Ransomware outbreaks can even enter the cloud
It's unfortunate but true: Moving your most valuable data to the cloud doesn't necessarily protect it if your company suffers a ransomware hack. Learn what ransomware can do in the cloud, and what infosec pros can do about that.
-
Article
Use data protection techniques and give ransomware the boot
Done right, data protection -- such as cloud-based disaster recovery -- is the best countermeasure organizations have to counter ransomware hacks. Read Now
-
Article
MIT expects ransomware to hit cloud computing in 2018
Ransomware that targets cloud services is one of the biggest cyber threats organizations will face in 2018, according to the Massachusetts Institute of Technology. Read Now
-
Article
How to handle the ransomware threat in cloud
Yes, there's ransomware in the cloud and it differs from traditional ransomware attacks. Learn how to prepare for both varieties. Read Now
-
Article
Putting it in the cloud doesn't always mean you're safe
Storing data in the cloud doesn't always protect you from an outbreak of ransomware. Expert Rob Shapland examines how the cloud helps and hurts when it comes to ransomware attacks. Read Now