What payment method for ransomware should I choose? (Hint: none)


Imagine this: your business has fallen victim to ransomware, with critical data locked away by cyber criminals who demand a ransom fee in return.

Are You Unable to Pay the Ransomware Gangs Offer Payment Extensions? Some ransomware gangs provide payment extensions similar to "buy now and pay later" schemes.

Recent research indicates that ransomware groups have become more imaginative with their extortion tactics. One group offers victims multiple choices when selecting ransom demands; these "options" may include:

Paying up to $10,000 may allow you to delay or delete their data before it becomes public.

As victims can usually negotiate the exact amount charged, this process takes on an entirely ne...

Top Data Breaches of 2023 - Breaches have reached unprecedented heights this year.


Cyber threats remain a serious danger and 2023 has already proven itself a landmark year in terms of data breaches; with an all-time record number of data compromises occurring in the US in only nine months of 2019. Therefore, the actual figures could end up being even greater overall.

In 2021, the last data breach was officially recorded. 1,862 organizations reported data breaches at this point; by September 2023 this figure will have grown over 2,100 times!

In the third quarter of 2023, three major data breaches occurred:

HCA Healthcare/Maximus, The Freecycle Network/IBM Consulting/CareSource Duolingo at Tampa General Hospital.

Cybercriminals have made no secret of their intent to exploit vuln...

Be Aware of 2024 Emerging Technology Threats


Last year, the global cost of data breaches reached US $4.45million; an increase of 15% from three years prior. As we move into 2024, new technological threats should be carefully considered - they could cause irreparable harm to your business and disrupt its success.

Technology is evolving at an incredible speed, creating both challenges and opportunities for both businesses and individuals. However, not all innovations are benign; certain innovations may threaten our digital safety, privacy and security.

This article will describe some of the emerging threats in technology that we should be mindful of by 2024.

Data Poisoning Attacks

Data poisoning refers to the corruption of datasets used for ...

Cyber Crime and young employees: exploring various perspectives

temp-post-imageParticular care must be taken with cyber security training if your workforce comprises employees between 16-19.

New research demonstrates that many young people have accepted as normal online behaviors which are concerning. Unfortunately, many of these activities may be illegal.

This type of cybercrime does not involve ransomware or data theft.

One-third of 16-19 year-olds admit to digital piracy - such as downloading illegal movies or hacking an account online to harass someone - at some point during their life.

Most of these behaviors will not directly harm your business; some are so widespread that many young people consider them part of everyday life.

Do not allow your employees to bring any ...

Why you need to learn about Secure By Design Cybersecurity Practices


Cybersecurity has become an integral component of most businesses today. Network security should be taken seriously by any entity no matter its size; cyberattacks may have long-term effects and should always be treated seriously.

Cyberattacks have grown increasingly sophisticated and sophisticated since 2022; IoT-based malware attacks saw an impressive 87% increase, as artificial intelligence-powered attacks increase exponentially.

Moving away from a reactive cybersecurity approach and adopting proactive measures such as "Secure by Design" are crucial.

International partners have taken steps to address vulnerabilities that are commonly exploited, and recently issued an advisory outlining Secur...

How to Combat SaaS Ransomware


SaaS (Software as a Service) has revolutionized how businesses operate, offering convenience, scalability and efficiency - no longer do you have to drag software from device to device - cloud collaboration has made working together effortless for everyone involved.

SaaS can have its drawbacks. Software and data hosted online are more vulnerable to attack; ransomware has recently begun targeting cloud environments.

Ransomware attacks against computers, servers and mobile devices have long been ongoing. Recently however, there has been an alarmingly sudden upsurge in SaaS-based ransomware attacks.

Odaseva conducted a study in 2022 which found 51% of ransomware targeted SaaS services during March ...