NEWS FROM THE EDGE

Tech Tips and Advice from the Experts at Dynamic Edge

it-security-risk

Earlier last month researcher identified a new ransomware attack that has already targeted and infected tens of thousands of businesses.

The new attack is a modification of the Locky malware that had infected businesses worldwide earlier this summer.

Massive New ‘Locky’-Variant Ransomware Is Attacking Businesses Across The US

IT Security experts are saying that the files containing the new “IKARUSdilapidated” strain of the Locky virus is able to move through endpoint defenses undetected.

The attack begins with an email attachment.
continue reading

business-disaster-recovery

Hurricanes are not that easy to predict. Will Hurricane Harvey strike Houston or 50 miles East? Will it start as a Category 1 or 5? Thanks to evolving meteorological technology, including better satellites and faster computers, scientists are able to model and make predictions on natural disasters like hurricanes and earthquakes with much more confidence than ever before.

But with more sophisticated and accurate models, hurricanes predictions are NOT guaranteed 100% accurate.

The devastation that Hurricane Harvey amassed this week has been hard to watch. And what’s harder for me is that officials and residents around Houston could not predict and hadn’t adequate planning to prepare for such a massive storm. The headlines tell this all-too-often story:
continue reading

healthcare-cyber-attack

Not surprising, cyber criminals are getting sneakier with their attacks and many of them are specifically targeting healthcare (although every business needs to take proper precautions). Cybersecurity is one of the most relevant topics to healthcare executives and health IT professionals in today’s current threat climate.

Problem 1: User safety is not a big enough priority

While health IT professionals seem to have complete focus on IT data management security, many fail to identify user-related threats as problems. That means, instead of focused on holistic measures to train and inform users about the latest attacks and schemes in which cyber criminals break into healthcare systems, they assume that their latest firewall update, antivirus platform and database management system are good enough.
continue reading

cybersecurity-wildfireDo you remember the WannaCry virus? That ransomware virus that moved through networks like a wild fire?

WannaCry hero arrested for malicious hacking

The biggest problem with WannaCry (and recent infection outbreaks) is that they are hard to stop. Once inside your network, these viruses autonomously move and navigate the extents of a network. WannaCry may simply be pioneering how computer viruses infect business networks in the future.

What put many of us at ease earlier this spring is that WannaCry had a terminus. Soon after its outbreak, a British researcher was able to trigger a killswitch which ended the life of the virus.
continue reading

cybersecurity-assessmentDo you have operating controls in place to protect confidential data?  Can you pinpoint where your confidential data goes inside AND outside your office?

 

 Have a documented process to ensure continued confidentiality of your data?

If you work or even touch confidential data—including ANY personal identifiable information (PII)—EVEN Remotely—you should be taking steps to ensure your data is secure and not at risk of being exposed from a hack, leak or theft.
continue reading

poor-it-security

I know this may sound weird, but cybercriminals do focus on customer service.

Particularly it comes to ransomware—an extortion scheme aimed at getting your money after locking down your computer files, demanding a ransom in return for a decryption key—many criminals have made getting top notch service and support a priority.

With easy payment processes—detailed instructions and all major credit cards accepted)—and simple instructions on how to use the decryption key, ransomware criminals have taken strides to make it as easy as possible for a victim to pay their ransom and get their data.
continue reading