Malware-Induced Downtime: 4 Ways to  Protect Critical Systems

Malware use is on the rise, with 323,000 new strains identified per day, according to one industry estimate. Hackers are increasingly offering mass production of malware and tailored cyber criminal services to earn more money and develop techniques that will avoid detection for longer periods of time. While organizations can certainly patch their v...

Threat Detection and Response : 5 Things You Need To Know About TDR Measures

Cyber security has become one of the biggest threats modern businesses face today. The number of data breaches in the U.S. hit an all-time high last year with 1,093 incidents reported, according to the Identity Theft Resource Center. This marked a 40 percent increase over breaches experienced in 2015. The rising quantity of attacks isn't expected t...

Ransomware Focus : The Risks that the New Variants of Locky Ransomware Pose

Ransomware has been put on the front lines as a cyber security threat, and Locky was one of the first strains to set the standards for modern techniques. The variants that emerged in campaigns in August 2017 and beginning of September have once again directed attention towards the Locky ransomware variants, and the risk it presents to unsuspecting ...

Faronics Tech Roundup – August in Review

No industry, country or business is safe from cyber security incidents. August saw several high profile network breaches, causing major damage to several organizations. Let's take a look at some of the biggest news that happened this month.

Game of Leaks: HBO Breached

At the beginning of August, HBO experienced a massive network breach o...

Ransomware Attacks can be a Costly Proposition for SMBs

Nearly half of surveyed organizations experienced a ransomware attack in 2016, according to a study by Osterman Research. In March of that year alone, 56,000 ransomware infections plagued unsuspecting businesses. So far, 2017 has been another big year for ransomware attacks. WannaCry and NotPetya both impacted thousands of companies and users with ...