August 11, 2020
Malware is a type of malicious software. It’s built to cause disruption on your computer or your network, typically to extract data or information that can then be used for financial gain. The stolen data or information could range from health records to employee usernames and passwords to bank account information.
August 4, 2020
Phishing, a type of social engineering, occurs when a third party attempts to obtain sensitive information via fraudulent electronic communication. Historically, this transpires through email or a text, but other communication apps can be used, such as WhatsApp, Instagram direct messages, and Facebook Messenger. In this article we’ll discuss phishing examples of today and how you can better prepare yourself against a phishing attack.
July 28, 2020
This week, we saw a very public example of a ransomware attack on Garmin, with their production services and products going offline from July 23rd - 27th. Measured’s Cyber Security expert Will Peteroy gives us his take on what happened, and the decisions companies face in the first article of our new series "after the breach".
July 7, 2020
Whaling is a targeted attack directed at high-level company employees, such as a CEO or CFO. Like other phishing attacks, the goal of whaling phishing is to impersonate a trusted person or brand and, by using social engineering tactics, trick the recipient into relaying sensitive information or transferring funds to the attacker.
June 30, 2020
Phishing, a social engineering attack typically delivered via email, impersonating a trusted brand or person, uses a wide net to catch victims. Spear phishing, on the other hand, is more targeted. In this article, we’ll answer the question: “what is spear phishing?” and offer actions you can take to protect yourself and your business from falling victim to a spear phishing attack.
June 23, 2020
Did you know that 95% of all malware is delivered via email? And 32% of data breaches also involve phishing. Phishing is a growing threat to businesses and individuals globally. If you’re just learning about phishing, or trying to gather information to help you combat it in your organization, we’ve compiled a guide to get you up-to-speed.
June 16, 2020
Ransomware attacks are becoming more and more common, but there are three key tactics crime actors employ to attack your network and systems. In this article we’ll cover three common ransomware attacks and the best practices to follow to prevent each one.
June 9, 2020
Google the phrase “How do I remove ransomware” and you’ll be greeted by hundreds of ads with promises that, for only a few hundred dollars, the ransomware attack you’re currently experiencing will be nothing more than a sad memory in only a few short hours. The truth about ransomware removal can be a little more dire. In this post we’ll cover the typical ransomware removal options and offer some tips on how to prevent a ransomware attack.