Jordan Kadlec

Picture of

Cybersecurity Spending to Top $100 Billion by 2020

Jordan Kadlec

With the growing fear of becoming the next victim of a cyberattack, companies are taking major precautions and upping their cybersecurity. Research firm International Data Corporation (IDC) recently…

Read More

UK Hospitals Hit by Cyberattack

Jordan Kadlec

The Northern Lincolnshire and Goole NHS Foundation Trust were hit by a cyberattack on Sunday, October 30th. The computer virus forced the three hospitals in its organization to go offline and caused…

Read More

Here Comes CryPy Ransomware

Jordan Kadlec

Ransomware has been all over cybersecurity headlines for the last ten months. This week’s feature is CryPy, a form of ransomware that is adding a spin to how files are encrypted and the ransom…

Read More

Smishing - Phishing's New Bait

Jordan Kadlec

Chances are, you have been receiving an onslaught of calls from automated voices saying they can lower your credit card interest rates or that you have randomly won a cruise. Apparently, the ‘do not…

Read More

Why Ransomware Attackers Really, Really Like Cloud Computing

Jordan Kadlec

Ransomware attacks are on the rise, and it is just a matter of time before a major attack is launched. So, businesses should take proper precautionary measures. A ransomware attack can disrupt all…

Read More

Preventative Measures Your Business Should Take Against Ransomware

Jordan Kadlec

Ransomware is a growing security threat among businesses, home, and government networks. Thus, it is crucial for everyone who runs a network to understand the preventive measures they can take…

Read More

How to Protect Your Networks from Ransomware

Jordan Kadlec

One of the fastest growing cyber threats is ransomware. Ransomware is malware that installs covertly on a victim's computer, executes a encryption attack, and demands a ransom payment to restore the…

Read More

What To Do If Infected with Ransomware

Jordan Kadlec

Ransomware is a type of malware that targets your most important data for the sole purpose of extortion. Once the cyber attacker has access to the data and administration system, they demand a ransom…

Read More

Deception Technology As A Key Emerging Security Technology

Jordan Kadlec

Cybersecurity threats evolve daily. As such, network security providers must be aware of the threat and respond in kind with more sophisticated and deeper ways of addressing security issues. A new…

Read More
Entrepreneur Link

Share

    

Subscribe to Email Updates

Recent Posts

Posts by Topic

see all