Measured Insurance Partners with Canopius and Long-time Backer SCOR to Expand Critical Cyber Insurance Solutions

The Kaseya Ransomware Attack: What Businesses Need To Know

Kaseya Attack

On July 2, 2021, Kaseya, a software provider, announced that it had been attacked and that some of its clients may have been affected. The company advised its clients to shut down any VSA servers they’re running to prevent any potential or further breach in their systems. Unfortunately, the company’s efforts were futile, and the […]

6 Signs of a Ransomware Attack

Ransomware Attacks

People often think that ransomware attacks just happen, but really, there are several warning signs that indicate they are about to take place. Knowing what these signs are can help you spot a ransomware attack much earlier, potentially limiting damage. Automated vs. Human-operated Ransomware Before getting into the six warning signs of a ransomware attack, […]

Ransomware payouts reach record levels in 2021 as extortion becomes more sophisticated

Ransomware 2022

Cybercriminals are flush with cash from successful ransomware campaigns, and they are using more sophisticated technology and tactics to drive up ransomware payments even further, with the Conti ransomware group leading the way. According to a report released by Palo Alto Networks’ Unit 42, the average ransom demand rose 144% to $2.2 million in 2021, […]

The State of Ransomware in 2022

Hacker carrying out a ransomware attack

Ransomware is a troubling form of malware. This malicious software is able to infiltrate a domain or network, encrypt data, and demand a ransom in exchange for a decryption key.  Worse yet, some ransomware will also threaten to expose your data if you refuse to pay. As a result, you could lose valuable information, compromise […]

Ransomware Examples: 50 Noteworthy Examples of Ransomware Attacks

Is your company protected from ransomware? Ransomware is a type of malware that infiltrates your network and encrypts important files. It can get in through email attachments, malicious links, and even vulnerabilities in your network security. Unlike other cyber attacks, ransomware holds your information hostage while attackers demand a fee for restoring access to your […]