Operations | Monitoring | ITSM | DevOps | Cloud


What is Ransomware and how to prevent ransomware attacks

Find out what ransomware is and its types in this super easy beginner’s guide. This quick video guide explains how ransomware attacks work and the steps enterprises can take to mitigate ransomware. The video also answers questions on – what are the stages of a ransomware attack, what are the various ransomware encryption techniques, and best practices to prevent ransomware attacks.

MSP Lawsuit Underscores Importance of Multi-Factor Authentication (MFA)

Sacramento, CA law firm Mastagni Holstedt has alleged that its MSP LanTech LLC failed to protect it from a ransomware attack that took down its systems. According to ChannelE2E, Mastagni Holstedt is also suing LanTech’s backup vendor Acronis, which has denied any responsibility for the ransomware attack. We’ll be watching to see how it all shakes out. In the meantime, let’s look at what happened and what we can take away from it. Hint: multi-factor authentication matters. A lot.

Prevent and Recover from Ransomware Attacks with Layered Security

Delivering effective security requires a layered approach varying from comprehensive backups, endpoint hardening, effective patch management for both the operating system as well as third-party applications, AV/EDR products like SentinelOne, and more. This list just scratches the surface of the myriad of tools and methods for maintaining a proactive security posture.

After a Ransomware Infection - Enhancing Security for Your Infrastructure Against Further Intrusion

In a previous blog, we outlined the essential steps that organizations should take within the first two days after the detection of a ransomware attack. In this follow-up post, we’ll discuss what an organization should do after the initial response to reduce the risks of future attacks. We’ll also highlight how Progress Flowmon can support ongoing network monitoring, early detection of attacks and reduction of further damage. Webinar: The First 48 Hours of Ransomware Incident Response.
Sponsored Post

It's Not Black Magic: Malware & Ransomware in Plain English

It was almost exactly 10 years ago in December 2013 that we wrote our first blog post about detecting CryptoLocker, which was the first sophisticated Ransomware attack of its kind back then. BTW, 2013 was the year of the Boston Marathon bombing, Edward Snowden leaking secret NSA information, Syrians fleeing their home country and Nelson Mandela passing away.

The First 48 Hours of Ransomware Incident Response

The initial response to a ransomware attack is crucial for determining the damage in terms of downtime, costs, data loss and company reputation. The sooner you detect the activity associated with ransomware, the sooner you can slow its spread. From there, you can take remedial actions to significantly reduce the effects of the attack.

Detect Ransomware with Flowmon

Experience Ransomware attack step by step and see how you can leverage Flowmon AI-powered threat detection to detect and stop ransomware attacks, before it reaches your storage and your critical data. Progress® Flowmon® is a network and security monitoring platform with AI-based detection of cyber threats and anomalies, and fast access to actionable insights into network and application performance. The solution supports cloud, on-prem and hybrid environments suitable for company-wide coverage, market’s fastest deployment time and has been recognised by Gartner since 2010.

Why Spyware Detectors are Essential in Today's Cyber Environment

As our world becomes increasingly dependent on technology and the internet, cybersecurity threats like spyware and malware are growing at an exponential rate. Spyware in particular, poses a dangerous risk, as it can secretly collect sensitive user data and online activity without consent. From financial theft to identity theft to erosion of privacy - the implications of spyware infections are incredibly detrimental, both for individuals and corporations. Therefore, using apps to detect spyware is absolutely critical in protecting devices and networks in today's high-risk cyber landscape.

How to Remove Trojan Viruses and Prevent Them in the Future

As subtle as they are dangerous, Trojan horses (or just “Trojans”) masquerade as benign software only to unleash havoc once inside your computer. Despite their stealthy nature, there are specific strategies you can employ to safeguard your digital assets from these threats. Below, we’ll discuss how to recognize the signs of a Trojan infection, steps for removing Trojan viruses from your devices, and how to reduce the risk of future infiltrations.