The Kelser Blog covers technology and business topics such as Cybersecurity, IT Lifecycle Management, Modern Data Center, Workforce Enablement, and more.
Just under a week into the New Year and the world is already experiencing the first critical vulnerability in 2018. Researchers have discovered two security vulnerabilities that collectively affect most modern chips made by Intel, AMD, and ARM. If exploited, a hacker could potentially steal data from the breached machine ranging from emails and browsing data to login credentials. So, what are these vulnerabilities and what steps can you take to protect your business network from them?
It seems like you can’t open a web browser, scroll through your LinkedIn timeline, or turn on the TV today without hearing about the latest data breach or threat to your cybersecurity. With high-profile breaches like Equifax and global ransomware outbreaks like Bad Rabbit, we’re in a very different world than just a few years ago. Perhaps you find that cyber threats and cybersecurity in general is annoying, overwhelming, or even frustrating but it’s imperative that cybersecurity protection become part of your business strategy. It doesn’t have to be as complicated or costly as you might think.
Start improving your cybersecurity posture now with this ebook, free when you subscribe to our blog.
Last week the third major ransomware outbreak in 2017 was spreading through Eastern Europe and even starting to creep further across the globe. So far striking Russia and Ukraine the most, Bad Rabbit has disrupted industries ranging from media outlets to banks. Some reports even have the attack showing up right here in the U.S. Similar to the Petya/NotPetya ransomware outbreak earlier this year (so similar in fact that Bad Rabbit reportedly shares 2/3 of its code with variants of Petya), this ransomware encrypts a system, requests a ransom (the current rate is about $285 in bitcoin) to decrypt the victim’s files, and then attempts to spread itself across the network. With ransomware and cyberattacks commonplace in today’s world, what takeaways can come out of the Bad Rabbit outbreak to help prevent these types of attacks from derailing your organization?
The malicious ransomware dubbed "WannaCry" has seized systems in over 150 countries since its discovery on May 12th, holding computers across all industries hostage. The program infects computers and encrypts their files, demanding $300 in Bitcoin or the files will be erased. This ransomware currently affects Microsoft Windows machines through an exploit known as EternalBlue. Given the severity of this attack and other ransomware variants following suit, it's time to make sure that your organization is protected. We've compiled this list of 9 resources that will help prepare your organization for malware attacks like WannaCry, so that you can ensure your files and information are safe.
Companies creating strong cybersecurity policies should focus less on generalities and more on specifics. What exactly can we do to block intrusion and monitor our systems to keep our data and our customers’ data safe? Adopting a proactive approach will help companies adapt to the changing nature of hackers. They’ve evolved from individuals out to cause mischief to part of larger, better-funded criminal enterprises.
Matt Kozloski, Kelser's Vice President of Professional Services, was recently invited to speak as a cybersecurity expert on WNPR's Where We Live along with FBI Special Agent Judy Eide. Where We Live is a regular segment that centers on Connecticut and New England, but also expands to the entire United States. Callers can phone in and speak with guests on the show directly - asking them questions about what it really means to them.