How to Protect Your Networks from Ransomware

Jordan Kadlec

One of the fastest growing cyber threats is ransomware. Ransomware is malware that installs covertly on a victim's computer, executes a encryption attack, and demands a ransom payment to restore the…

Read More

Mirai Botnet Responsible for Largest DDoS Attack

Greg Edwards

Twitter, Reddit, Spotify, Etsy and what seems like an endless list of websites were down for an extended amount of time on Friday (Oct. 21) due to a Distributed Denial of Service (DDoS) attack on…

Read More

What To Do If Infected with Ransomware

Jordan Kadlec

Ransomware is a type of malware that targets your most important data for the sole purpose of extortion. Once the cyber attacker has access to the data and administration system, they demand a ransom…

Read More

Deception Technology As A Key Emerging Security Technology

Jordan Kadlec

Cybersecurity threats evolve daily. As such, network security providers must be aware of the threat and respond in kind with more sophisticated and deeper ways of addressing security issues. A new…

Read More

How a Popular Bitcoin Site Could Have Prevented The Attack on Their Site

Jordan Kadlec

A popular Bitcoin transaction site known as blockchain.info suffered a temporary DNS attack. The company’s internet properties were subjected to rogue control for the duration of the attack on the…

Read More

Tip of the Week – A Free Tool For Testing Anti-Ransomware Defenses

Nathan Studebaker

We have written two PowerShell scripts that function just like ransomware. One script encrypts the data, and the other script decrypts the data using a public/private key pair. We created these as a…

Read More

How to Check if You've Been Affected by the Yahoo Hack

Jordan Kadlec

As some reading this may know, the Yahoo hack happened last month. Sources are starting to state that this may be the biggest hack in history. A state-sponsored actor sparked a network security…

Read More

What is Endpoint Detection and Response (EDR)?

Chris Hartwig

Talk to any security expert in the field who has a few years of experience under their belt, and they will tell you the current threat landscape is ever-evolving and it takes a lot of effort and…

Read More

Types of Social Engineering

Greg Edwards

As the CEO of WatchPoint, I believe marketing our products is an extremely important part of the success of our business. We want our customers to be aware of the many ways we can protect their…

Read More
Entrepreneur Link

Share

    

Subscribe to Email Updates

Recent Posts

Posts by Topic

see all