Measured Insurance Partners with Canopius and Long-time Backer SCOR to Expand Critical Cyber Insurance Solutions

After the breach : Garmin and WastedLocker

after_the_breach_hero_image

This week, we saw a very public example of a ransomware attack on Garmin, with their production services and products going offline from July 23rd – 27th. Garmin, with a market cap of $19 Billion saw the attack impact everything from their manufacturing activities to their consumer and commercial services. Garmin’s public-facing impacts were far-reaching, […]

Phishing Examples

phishing_examples_hero_image

Phishing, a type of social engineering, occurs when a third party attempts to obtain sensitive information via fraudulent electronic communication. Historically, this transpires through email or a text, but other communication apps can be used, such as WhatsApp, Instagram direct messages, and Facebook Messenger. Sensitive information can include usernames, passwords, credit card information, social security […]

The Definitive Guide to Malware

the_definitive_guide_to_malware_hero_image

Neary 10 million malware attacks occurred in 2019, with nearly 450,000 new variants detected. Attacks range from phishing emails to CEO fraud, but the goal is one in the same: disruption. But first, this article is part of our Definitive Guide to Malware series: Definitive Guide to Malware How to Detect Malware How to Get Rid of Malware In […]

How to Detect Malware

how_to_detect_malware_hero_image

Over 7 billion malware attacks were reported in 2019. Every minute, four companies fall victim to ransomware attacks, a form of malware. Learning how to detect malware and get rid of malware is becoming increasingly important for anyone who accesses the Internet and works online. In this article, we’ll cover how to detect malware on your computer, including […]

How to Get Rid of Malware

how_to_get_rid_of_malware_hero_image

Malware, short for “malicious software,” is commonly found as a computer virus, spyware, ransomware, worm, adware, or a Trojan horse. Malware typically disguises itself as something else in order to get into your system and execute its program. If you’ve been infected, read on to learn how you can get rid of the malware on […]