Caught between a rock and a hard place, many ransomware victims cave in to extortion demands. Here’s what might change the calculus. The recent spate of ransomware payments cannot be the best use of cybersecurity budgets or shareholder capital, nor is it the best use of insurance industry funds. So, why are companies paying and … More Ransomware: To pay or not to pay? Legal or illegal? These are the questions …
By failing to prepare you are preparing to fail – here’s what you can do today to minimize the impact of a potential ransomware attack in the future. While more concerted efforts from various anti-ransomware groups continue to bring pressure to bear on ransomware operators, successful attacks are still making the headlines. It’s not just large operators in … More 5 essential things to do before ransomware strikes
The attack is a reminder of growing cyberthreats to critical infrastructure while also showing why providers of essential services are ripe targets for cybercriminals. While detractors have argued that threats against physical infrastructure are overstated and largely theoretical, the growing list of organizations that have been successfully attacked suggests otherwise. And now the media is full of … More Colonial Pipeline attack: Hacking the physical world
Ireland appeared to be shaken to the core by the recent cyberattack on HSE and the Department of Health, but once past the initial shock, is it time for an in-depth look at the Irish cybersecurity infrastructure and whether such attacks could not have been anticipated, detected or prevented. In 2017 the National Health Service … More What can we learn from the HSE and Department of Health ransomware attacks?
What are some common strategies cybercriminals employ in extortion schemes and how can you mitigate the chances of falling victim to a cyber-shakedown? When it comes to coercing people into parting with their money, cybercriminals seem to have an endless bag of tricks to choose from. There are some tricks, that they favor more than others, … More 5 ways cybercriminals can try to extort you