What Damage Can Phishing Cause to Your Business?

A cyber-attack costs a small business on average $53 987. Although this is much less that the cost associated with cyber-attacks on medium and large enterprises that easily escalates to millions of dollars, when considered from a proportion to size point of view, it is substantial. One of the ways hackers wreak this havoc is … Read more

Five Cyber Threats that Security Teams Should Pay More Attention to

Ransomware has been a major threat to organizations for the last couple of years and is one of the most publicised threats online. But it is by no means the only cyberthreat your organization will face. Preparing to face these threats head on can facilitate increased security while preparing IT risk managers to improve their strategy’s … Read more

MALWARE MAYHEM: The Current State of the Malware Threat Landscape and How To Stay Ahead

The malware threat landscape saw many changes since 2018 – traditional threats such as ransomware are still rife, causing damage to organizations and their bottom-line; crimeware (financially motivated malware) remains the most prevalent threat; while threats such as cryptojacking (“the unauthorized use of a device by cybercriminals to mine for cryptocurrency”) and phishing notably increased. … Read more

Five best practices to ensure ransomware does not harm your business

Software viruses remain one of the leading threats to both businesses and individuals. Dealing with the consequences of any malware attack is an enormous challenge and even more so in the event of a ransomware attack, as the latter is often impossible to resolve. What is ransomware?  Ransomware is a type of malware or malicious … Read more

RANSOMWARE HITS HOME.

Written by admin on March 21, 2014. Posted in CTO Blog, S2D Blog Hello, your files are encrypted with RSA-4096 algorithm http://en.wikipedia.org/wiki/RSA You will need at least few years to decrypt these files without our software. All your private information for last 3 months were collected and sent to us. To decrypt your files you … Read more