Quiz: How well do you know the latest malware threats?

Posted by Anne Campbell on Jun 30, 2015 11:30:00 AM

Think you’re a cybersecurity expert? It seems like a new malware strain crops up every day, continually putting your SMBs customers—and their data—at risk. Staying ahead of cyber criminals and the latest threats can be a challenge, even for the most alert business owners and IT service providers.

Read More

Topics: Malware, Cyber Security

Rombertik: What you need to know about malware’s suicide bomber

Posted by Paul Hanley on May 5, 2015 4:27:30 PM

Researchers at Cisco Systems’ Talos Group have identified a new variety of malware that, if detected, attempts to take its host computer with it. Known as Rombertik, it is unique in terms of the lengths it will go to avoid both detection and removal, but it utterly mundane in terms of its designed function. 

Read More

Topics: Malware, IT Security, Cyber Security

Common cyber security mistakes your SMB customers are making

Posted by Neal Bradbury on Apr 22, 2015 8:30:00 AM

Bad habits are hard to break, and that’s especially true when it comes to small businesses and cyber security. After all, it’s easy for SMBs to think “that will never happen to me,” and let things slide that end up creating real security concerns.

The truth is data breaches and cyber attacks are  very real possibilities for small businesses. According to the National Small Business Association, 44 percent of small businesses report being the victim of a cyber attack, and the number of data breaches reported each year continues to climb.

Read More

Topics: Malware, Data Loss, Cyber Security

TeslaCrypt and CryptoWall bring new approaches to ransomware

Posted by Paul Hanley on Mar 30, 2015 2:00:00 PM

As the saying goes, what’s old is new again, but sometimes what’s new can still be new again.  Enigmatic?  Perhaps, but two programs in the ransomware category are doing their best to prove this.  An old friend that I’ve written about several times now, CryptoWall, is pioneering a new infection vector, while a fresh challenger, TeslaCrypt, is seeking to carve out a new target niche that has been underexploited.  Let’s see why security experts are concerned about these two infectious agents.

Read More

Topics: Malware, IT Security, Cyber Security

16 Things the Data Loss Gremlins Hate

Posted by Anne Campbell on Mar 30, 2015 12:30:00 PM

The troublesome data loss gremlins are always plotting devious new ways to destroy your most important data and ruin your day—and your livelihood. As soon as you let down your guard, they’ll sneak up on you with a nasty surprise, like a security breach, a server meltdown, or a devastating fire that will leave you and your customers scrambling to pick up the pieces.

That doesn’t mean you’re totally defenseless, though. Every data loss gremlin has a weakness, something they hate with a passion because it keeps foiling their evil plans. Knowing what these weaknesses are will help you scare off Scratch, Scorch, Klepto, Mal, Mayhem, and Whoopsie Daisy and keep your data safe.

Read More

Topics: Malware, IT Security, Business Continuity and Disaster Recovery, Cloud Backup and Recovery, Data Loss, Cyber Security

Quiz: Which data loss gremlin are you?

Posted by Anne Campbell on Mar 26, 2015 9:00:00 AM

With World Backup Day right around the corner, we’ve been spending a lot of time here at Intronis talking about the data loss gremlins and the major threats they represent to MSPs and their small business customers.

The problems the data loss gremlins can cause are serious. According to the National Archives & Records Administration in Washington, DC, 93 percent of SMBs that lose data access for 10 or more days are bankrupt in a year.

Read More

Topics: Malware, IT Security, Business Continuity and Disaster Recovery, Cloud Backup and Recovery, Data Loss, Cyber Security

Why MSPs need to change their approach to IT security in 2015

Posted by Neal Bradbury on Feb 24, 2015 9:00:00 AM

With massive data breaches making headlines on a regular basis, like the one that recently affected up to 80 million customers of the health insurance giant Anthem, it’s hard to ignore the fact that data security is becoming increasingly important. Unfortunately, there are still far too many SMBs that don’t understand just how serious the threat is.

Earlier this month, we spoke to a number of small business owners to conduct a little primary research, and virtually all of them were seriously under-aware of the threat of ransomware. Their response pretty much boiled down to, “Well, let’s hope that doesn’t happen to me!”

Read More

Topics: Malware, Cyber Security

It’s Back: CryptoWall 3.0 Enters With a New Ransomware

Posted by Paul Hanley on Jan 19, 2015 1:52:00 PM

After several slow months, it seems that the authors of the infamous CryptoWall malware (Win32/Crowti or Trojan.Cryptowall) have re-emerged from wherever they’ve been hiding and have brought another version of their devious malware with them. Dubbed “CryptoWall 3.0” by security blogs and researchers, the new malware contains a number of changes and additions over the previous version.

Read More

Topics: Malware, Cyber Security

KEYHolder malware – The latest ransomware craze

Posted by Paul Hanley on Dec 10, 2014 3:07:00 PM

A new contender in the ransomware space has burst onto the scene in the last few days. Known as KEYHolder malware, it follows in the same vein as CryptoLocker, CryptoWall, CryptoDefense, and similar members of the Locker family of malware. 

Read More

Topics: Malware

Shellshock Bash bug: You are safe with Intronis

Posted by Naomi Price on Sep 26, 2014 1:41:00 PM

As many MSPs have already heard, the United States Computer Emergency Readiness Team (US-CERT) reported Wednesday that there is a new bug, termed "Shellshock" or "Bash" bug, that is affecting Unix-based operating systems such as Linux and Mac OSX.

The vulnerability affects the Unix command shell “Bash” (Bourne Again Shell), which is installed not only on computers, but also on other devices that use a subset of Linux, such as smart locks, cameras, and storage and multimedia devices.

Read More

Topics: Malware

KEEP UP WITH THE LATEST CLOUD NEWS

Follow Intronis