fbpx

Blog

Netcotech Blog

New Study Finds That Paying Off Your Ransomware Attackers Has Some Severe Consequences

117271184_ransomware_400

We know, we know; you’re probably sick of seeing ransomware in headlines, and so are we, but we cannot stress enough how important having an awareness of it is for any business owner. A new study has found that businesses infected by ransomware who choose to pay up experience a different type of fallout--one that is a major cause for concern and a stark reminder that there are no guarantees with ransomware. Ever.

Continue reading
  210 Hits

What Threat is a Small Business Really Under?

89071015_cyberthreats_400

Small businesses face a lot of risks, one obvious one being the threat of potential cybercrime and how its influence can impact their businesses. Let’s consider how these influences have taken shape, and the challenges that small and medium-sized businesses must now face as a result.

Continue reading
  301 Hits

Tip of the Week: Mobile Malware’s Warning Signs

279266146_mobile_malware_400

Chances are, you own a smartphone, and that device helps you to manage quite a bit, both personally and professionally. As smartphones have risen in importance, they have also drawn the attention of hackers who attack via malicious applications. Here, we wanted to offer some tips that can help you spot these malicious apps before falling victim.

Continue reading
  517 Hits

Watch Out for All Different Kinds of Ransomware

187816575_ransomeware_400

Ransomware has become infamous in the past few years, largely due to its involvement in a growing number of cyberattacks during this time. Of course, not all ransomware works in the same way, and recognizing the difference could prove to be useful. Therefore, we’ve taken a few moments and assembled a brief description of the four most common ransomware varieties.

Continue reading
  601 Hits

Coronavirus Anxiety Causing Expanded Phishing Threats

324780244_coronavirus_scams_stop_phishing

The COVID-19 pandemic has certainly changed the way we do things in a very short period of time. Unfortunately, in times of absolute crisis and anxiety, cybercriminals use it as camouflage to steal data and infiltrate normally-secure networks. Let’s take a look at some of the ways hackers are able to exploit your employees and how you can work to protect your business. 

Continue reading
  614 Hits

A Guide to Help You Understand All the Digital Threats You Face

275842669_threat_400

Malware is a commonality in today’s computing environment, though businesses do everything in their power to avoid encountering it. Some people have difficulty identifying threats, which makes for a dangerous situation whenever they actually have to handle them. We’ve put together a malware guide that will help your employees identify the most common types of threats out there, as well as how to respond to them.

Continue reading
  826 Hits

This Florida City Will Pay 65 Bitcoins to Get Files Back

273707836_florida_400

Florida’s Atlantic coast is a destination for millions of visitors each year. One visitor is costing a coastal city a pretty penny. Riviera Beach, a small city just north of West Palm Beach, has been hit with a major ransomware attack. Today, we’ll tell you how it came to be that the small beach city would make dubious history by paying what is the largest ransomware payout in the short history of these attacks.

Continue reading
  851 Hits

Is it Wrong to Purchase Access to Your Own Data?

152415539_ransom_400

Ransomware is a contender for the favorite method of attack for hackers. If you think about it, ransomware presents a no-loss situation. Either the victim pays the ransom and the hackers laugh all the way to the bank, or they move on to the next target and give them the same ultimatum.

Continue reading
  847 Hits

Hack Enabled by NSA-Developed Tool

64523694_NSA_400

Hackers aren’t the only ones out there developing malware tools, but sometimes, they get their hands on some of the others. This is precisely what happened when Double Pulsar, a malware that the NSA has used in the past, was paired with a Chinese hacking tool and used to attack Hong Kong and Belgium in 2016.

Continue reading
  1232 Hits

Ransomware Can Just Be Devastating

P9UKKRA_ransome_400

Ransomware is still going strong, and now more than ever it’s important to emphasize the danger that it poses for your organization. Even municipalities and other high-profile targets are at risk of being taken down by ransomware. Since 2013, over 170 government systems at the county, city, or state levels have been attacked.

Continue reading
  1117 Hits

Mobile Malware is on the Rise

121033144_mobile_malware_400

When considering cybersecurity, it can be easy to overlook the computers that so many of us typically carry with us every day: our smartphones. However, as attacks to mobile devices have risen considerably in the recent past, it is important to recognize the severity of these attacks, as well as how to avoid them.

Continue reading
  1138 Hits

Most Noteworthy Data Breaches in 2019

82453654_breach_400

With data starting to be treated more like a commodity, companies are spending more time and money attempting to secure the data they have. Some organizations aren’t successful. In 2018 over 446.5 million records were exposed, even as data breaches dropped by 23 percent to 1,244. Today we take a look at some of the most noteworthy data breaches that have happened in the first four months of 2019.

Continue reading
  922 Hits

SamSam Is More than a Computer Virus

samsam_ransom_400

I think by now most people understand just how dangerous ransomware is. Even with some of the ridiculous names they have like Gandcrab, Jigsaw, and WannaCry. Hell, two strains even have names from the James Bond canon: LeChiffre and GoldenEye. But one funny-named strain of ransomware, SamSam, has been devastating information systems for sometime, and has caught the eye of several U.S. law enforcement agencies.

Continue reading
  1158 Hits

A Short Look at 2018 in Cybersecurity

2018_cybersecurity_400

Hackers and other security threats are everyday problems for users all over the world. We’re not even talking about just simple phishing emails--you’d be surprised by how many victims are from straight-up hacking attacks. The security sector has been forced to adapt, growing at an astronomical rate. To help your organization get up to speed on the latest threats and hacks, we’ve put together a list of the first half of 2018’s most notorious breaches and statistics related to them.

Continue reading
  1159 Hits

The Nigelthorn Malware is a Lot Less Friendly than its Namesake

nigelthorn_malware_namesake_400

You can never be too careful about what you install on your computers. In this most recent example, Google Chrome users are finding themselves targeted by a new type of malware called Nigelthorn.

Continue reading
  1179 Hits

Ransomware Attack Strikes Atlanta

atlanta_ga_ransomware_400

Ransomware can target all kinds of entities, but one of the most devastating attacks in recent memory was launched against Atlanta, Georgia earlier this year. Atlanta suffered from an incredibly sustained and powerful ransomware attack that disabled much of the municipal government.

Continue reading
  1317 Hits

North Korea Suspected as Responsible for WannaCry Attack

north_korea_red_malware_400

According to the homeland security adviser to the White House, Tom Bossert, international blame for the global WannaCry attack is being directed toward North Korea. Responsibility for the attack that spanned from May 12th to the 15th of 2017 has been firmly placed on the Democratic People’s Republic of Korea, which Bossert says is in agreement with the conclusions of Australia, Canada, Japan and New Zealand.

Continue reading
  1232 Hits

The Right Analogy Makes Hacking Make More Sense

using_a_door_lock_to_explain_network_security_400

How often have you started to read something you thought may be valuable to you, only to put it down a few moments later, completely lost because of the use of technical language and industry jargon? The IT industry can be especially guilty of this. However, since this is need-to-know information, we’ve decided to go over a few crucial security concepts by representing your business security with a locked door.

Continue reading
  1301 Hits

What Does a SMiShing Attempt Look Like?

little_contruction_men400

Phishing--it’s a threat that tells a tantalizing lie to entrap its target, and one that you’ve likely heard of before. However, as technology has advanced, so have the opportunities that cybercriminals have to leverage phishing attempts. Smartphones, for instance, make it so that you must be aware and on the lookout for SMiShing scams.

Continue reading
  1742 Hits

It’s Cybersecurity Awareness Month! Educate Yourself on These Threats

cyber_security_brown400

October is Cybersecurity Awareness Month! To prepare for this incredibly important month, you’ll want to focus your efforts on ensuring your business is protected against the myriad of online threats that can pose a danger for your business. Thankfully, you don’t have to do it alone. With our trusted IT professionals by your side, you’ll be able to take the fight to hackers and other entities that threaten your data.

Continue reading
  1450 Hits