Ask Intronis: How do I recover a customer after a CryptoWall 4.0 attack?

Posted by Courtney Steinkrauss on Jan 25, 2016 9:00:00 AM

Q: My team has been dealing with a worst-case scenario. One of our customers was hit with CryptoWall 4.0, and their systems need to be restored. We’ve paid the ransom, and the ordeal is over, but none of us (my customer and my team) want to deal with this again. To avoid another ransomware attack, I want to find out exactly how the malware infiltrated their network. How can I pinpoint where the breach happened and protect my customer from another attack?

Read More

Topics: Malware, Customer Management

CryptoWall returns for another round with CryptoWall 4.0

Posted by Paul Hanley on Nov 6, 2015 12:05:24 PM

The gold standard in ransomware, CryptoWall, is making the rounds again with a new 4.0 release. In this revision, there are some pretty important changes that are going to make life more difficult for both infectees and security researchers looking to counter the software’s malicious activities.

Read More

Topics: Malware

The 3 worst data breaches of all time (and what we learned from them)

Posted by Achmad Chadran on Oct 19, 2015 12:00:00 PM

On the occasion of October’s Cyber Security Awareness Month, we revisit three of the largest data breaches ever to make the headlines.

Data breaches happen. The more the data under your management, the greater the price you’ll pay in lost business, litigation, and ill will. But all businesses — from mom-and-pop shops to Fortune 100s — can stand to learn from these epic disasters.

Cybersecurity webinar  

Read More

Topics: Malware, Cyber Security, msp, trojan, sql injection

Top malware threats to watch: CryptoWall, Jellyfish, Demon, and Moose

Posted by Paul Hanley on Jul 2, 2015 8:50:00 AM

It’s becoming more and more commonplace to read headlines reporting the latest and “greatest” security breach affecting a major corporation. Target, Home Depot, Anthem, and even the United States government have all been affected by cybercriminals hacking into their system and exploiting their sensitive information.

While these attacks are becoming more frequent, they’re also becoming more sophisticated. Cloud computing has made it easier for cybercriminals to infiltrate systems and obtain sensitive information. Of these cybercriminals, malware authors are key players. They’re creating new software used to steal this information, and they’re perfecting the variants of malware that already exist. To understand these developments, let’s look at the top three types of malware IT service providers and SMBs need to be aware of today.

Read More

Topics: Malware, Cyber Security

Quiz: How well do you know the latest malware threats?

Posted by Anne Campbell on Jun 30, 2015 11:30:00 AM

Think you’re a cybersecurity expert? It seems like a new malware strain crops up every day, continually putting your SMBs customers—and their data—at risk. Staying ahead of cyber criminals and the latest threats can be a challenge, even for the most alert business owners and IT service providers.

Read More

Topics: Malware, Cyber Security

Rombertik: What you need to know about malware’s suicide bomber

Posted by Paul Hanley on May 5, 2015 4:27:30 PM

Researchers at Cisco Systems’ Talos Group have identified a new variety of malware that, if detected, attempts to take its host computer with it. Known as Rombertik, it is unique in terms of the lengths it will go to avoid both detection and removal, but it utterly mundane in terms of its designed function. 

Read More

Topics: Malware, IT Security, Cyber Security

Common cyber security mistakes your SMB customers are making

Posted by Neal Bradbury on Apr 22, 2015 8:30:00 AM

Bad habits are hard to break, and that’s especially true when it comes to small businesses and cyber security. After all, it’s easy for SMBs to think “that will never happen to me,” and let things slide that end up creating real security concerns.

The truth is data breaches and cyber attacks are  very real possibilities for small businesses. According to the National Small Business Association, 44 percent of small businesses report being the victim of a cyber attack, and the number of data breaches reported each year continues to climb.

Read More

Topics: Malware, Data Loss, Cyber Security

TeslaCrypt and CryptoWall bring new approaches to ransomware

Posted by Paul Hanley on Mar 30, 2015 2:00:00 PM

As the saying goes, what’s old is new again, but sometimes what’s new can still be new again.  Enigmatic?  Perhaps, but two programs in the ransomware category are doing their best to prove this.  An old friend that I’ve written about several times now, CryptoWall, is pioneering a new infection vector, while a fresh challenger, TeslaCrypt, is seeking to carve out a new target niche that has been underexploited.  Let’s see why security experts are concerned about these two infectious agents.

Read More

Topics: Malware, IT Security, Cyber Security

16 Things the Data Loss Gremlins Hate

Posted by Anne Campbell on Mar 30, 2015 12:30:00 PM

The troublesome data loss gremlins are always plotting devious new ways to destroy your most important data and ruin your day—and your livelihood. As soon as you let down your guard, they’ll sneak up on you with a nasty surprise, like a security breach, a server meltdown, or a devastating fire that will leave you and your customers scrambling to pick up the pieces.

That doesn’t mean you’re totally defenseless, though. Every data loss gremlin has a weakness, something they hate with a passion because it keeps foiling their evil plans. Knowing what these weaknesses are will help you scare off Scratch, Scorch, Klepto, Mal, Mayhem, and Whoopsie Daisy and keep your data safe.

Read More

Topics: Malware, IT Security, Business Continuity and Disaster Recovery, Cloud Backup and Recovery, Data Loss, Cyber Security

Quiz: Which data loss gremlin are you?

Posted by Anne Campbell on Mar 26, 2015 9:00:00 AM

With World Backup Day right around the corner, we’ve been spending a lot of time here at Intronis talking about the data loss gremlins and the major threats they represent to MSPs and their small business customers.

The problems the data loss gremlins can cause are serious. According to the National Archives & Records Administration in Washington, DC, 93 percent of SMBs that lose data access for 10 or more days are bankrupt in a year.

Read More

Topics: Malware, IT Security, Business Continuity and Disaster Recovery, Cloud Backup and Recovery, Data Loss, Cyber Security

The MSP's Complete Guide to Cyber Security
Intronis demo lunch
Fixed Price Data Protection