jolera-logo-24-white

Anatomy of a Ransomware Attack

Ransomware is on the rise. Recent research from Malwarebytes found that ransomware targeting businesses has increased by 195% compared to the last few months of 2018. For hackers, ransomware remains a lucrative business. The average cost of a ransomware demand has now...

3 Types of Insider Threats to Look Out For

Most organizations may see hackers as their biggest threat but security threats can happen from inside their company as well. According to Verizon, 57% of database breaches involved insider threats within an organization.  Insider threats can occur in various ways and...

5 Business Impacts of Cyber Attacks

The impacts of a cyber attack can be devastating, and many executives are now recognizing cybersecurity as a key business driver. A recent report from Radware surveyed executives worldwide and found that security remains a top priority in the enterprise, with 72% of...

How Botnets Infect Your Computers

The increase of IoT devices and their lack of security is giving rise to several cyber threats, including botnets. Botnets not only target corporate devices but infect home IoT devices like security cameras. One of the largest botnet attacks was the Mirai botnet...

4 Ways Legacy Systems Challenge Security

As technology continues to upgrade and change, many systems that are currently in place in organizations tend to become outdated. For example, Microsoft recently announced that Windows Server 2008 and SQL Server 2008 will be reaching end-of support. This means that...
This site is registered on wpml.org as a development site. Switch to a production site key to remove this banner.