Home LookingPoint Blog

Blog

How secure are your logins to your bank, credit cards, email, online stores, social media, password safe, or accounts you use for work? Do you use authentication apps like Duo, Google Auth, or Authy? How many different factors do you use today to get access to your devices and services? Once you’ve thought about your answers to these questions, let’s see if I can introduce any new ideas to you.

Continue reading

You may have seen news reports on the Colonial Pipeline malware attack. The main questions I’ve heard from family and friends are “How did something like that happen?” and “Why couldn’t they stop it?” In my opinion, there are many reputable news agencies and other organizations that have weighed in and done very good work at explaining the intricacies of what happened. I would encourage the...

Continue reading

Recently we had a business owner come to us asking for help recovering their files from a ransomware attack.

Continue reading

Security has been a leading topic throughout 2017 across all industries. Malware, more specifically ransomware, has been a dominant cyber threat with damage costs predicted to exceed $5 billion this year, according to Cybersecurity Ventures.Cisco recently released their 2017 Annual Cybersecurity Report. This year is the 10-year anniversary of the annual report, which provides key insights and...

Continue reading

Only 46 days after the WannaCry ransomware attack began a new threat has emerged, and appears to be spreading quickly. "Researchers with multiple firms identified the ransomware as Petya, malware that makes computers inoperable by encrypting their hard drives and demands ransoms in exchange for a digital key to restore access." [Reuters] 

Continue reading

Today, the most significant cyber threat is Ransomware – a type of malicious software designed to hold a user’s files (such as healthcare records, financial contracts, software codes, and other documents) for ransom by encrypting them and demanding the user pay a fee to decrypt them. Ransomware attacks use sophisticated infrastructure and resilient techniques to target data and hold critical...

Continue reading
1
  • There are no suggestions because the search field is empty.

Latest Tweets