Ransomware Alive and Well in Healthcare

Cryptojacking Surges as Ransomware Grows More Sophisticated

Exactis Leaks Personal Data of 340 Million

3 Key Takeaways from the FastBooking Data Breach

Should You Pay the Ransomware Ransom?

World Cup Cybersecurity Risks

What is Cryptojacking?

2018 Mid-Year Cybersecurity Update

GandCrab Ransomware Puts the Pinch on Europe

W-2 Phishing Scheme Evolves as End of Tax Season Nears

Cities Becoming Big Targets for Ransomware Attacks 

Annabelle Ransomware Creating Horror for Infected Computers

Ransomware Distributed as Email from the IRS

SamSam Ransomware Continues Attacks on Vulnerable Hospitals and Health Systems

2017 Cybersecurity in Review

Should I be worried about the WPA2 vulnerability 'Krack'?

NIST 800-63b Password Guidelines Surprises

Cybersecurity Q&A with WatchPoint CEO, Greg Edwards

Ransomware Removal

Why You Should Change Your Passwords

What Usually Happens In a Ransomware Attack

45 New Decryptors added to the Free Ransomware Decryptors

Different Types of Ransomware

Equifax Suffers Massive Data Breach

Credit Freeze | What to Expect – My Personal Experience

Petya Ransomware - WannaCry's Successor is Here!

Sorebrect - The Fileless, Code Injecting Ransomware

Microsoft & Co Release June Security Updates

Bitcoins Are Worth How Much?!

WannaCry Takeaways

WannaCry- Fastest Spreading Ransomware Ever

Security Breach Notification Laws

Fileless Malware Demystified

Google Docs Phishing Scheme

April Ransomware in Review

Ransomware Decryptors Not Available for Most Ransomware Strains

Mole Ransomware: A New Variant of CryptoMix

WatchPoint Tip of the Week - Employee Ransomware Email Notice

Death of Aaron Hernandez Exploited by Ransomware Cybercriminals

Dharma Ransomware Has A New Extension

Healthcare Organizations are Biggest Targets for Ransomware

March Ransomware in Review

Matrix Ransomware - CryptoStopper Can Help!

Star Trek Themed Ransomware

Double Agent: The Zero-Day That Could Last for Months

Ransomware Decrypters | Where to Find the Antidote

Spear Phishing Examples

Top 7 Revelations of Vault 7

Advanced Persistent Threats and Ransomware

February Ransomware in Review

Ransomware Simulator Script – A tool for testing ransomware defenses

Zero-Day Attack Examples

Ransomware Definition

BEWARE: You Can be Sued for Cybersecurity Negligence

DynA-Crypt - Encrypts AND Steals Your Data

PlayStation and Xbox Users Hacked

January Ransomware in Review

Should I Worry About Getting Hit by Ransomware?

Cyber Ransom v. Ransomware

Satan Ransomware-As-A-Service

New Phishing Campaign Targeting Gmail Users

Spora - The Ransomware of 2017

From Russia With Love - Cerber Ransomware-as-a-Service

Russia Hack Report Quick Facts

U.S. Responds to DNC Data Breach

Ransomware Targeting HR Departments

2016 Cybersecurity Review

December Ransomware in Review

Android Ransomware Infects Smart TVs

Cybersecurity Threats Over Christmas

Android Banking Trojans Now Include Ransomware

2017 Cybersecurity Predictions

Popcorn Time Ransomware Spreading Christmas Cheer!

GoldenEye Ransomware - A New Variant of Petya Ransomware

Deception Technology for Business

Kelihos Botnet Making Its Return by Distributing Ransomware

November Ransomware in Review

Stopping Ransomware Using Deception

Locky Ransomware Infiltrates Facebook Through JPG Images

San Francisco Public Transit Hit by Ransomware Attack

How Ransomware Stole Christmas

Oh The Irony - Russian Government Hacked

Adult Friend Finder Exposed in Latest Breach

RATs Everywhere

Cybersecurity Spending to Top $100 Billion by 2020

UK Hospitals Hit by Cyberattack

Anatomy of Ransomware

Here Comes CryPy Ransomware

Smishing - Phishing's New Bait

Why Ransomware Attackers Really, Really Like Cloud Computing

Preventative Measures Your Business Should Take Against Ransomware

How to Protect Your Networks from Ransomware

Mirai Botnet Responsible for Largest DDoS Attack

Test CryptoStopper - Ransomware Simulator

Using Group Policy to Disable Show Hidden Files

What To Do If Infected with Ransomware

Deception Technology As A Key Emerging Security Technology

How a Popular Bitcoin Site Could Have Prevented The Attack on Their Site

Tip of the Week – A Free Tool For Testing Anti-Ransomware Defenses

How to Check if You've Been Affected by the Yahoo Hack

What is Endpoint Detection and Response (EDR)?

Types of Social Engineering

Starting an Insurance Company from Scratch – A Complete Guide

Three Common Ways Ransomware Enters Your Network

A Guide to Starting Your Own Law Firm

8 Marketing Ideas for Insurance Agents in 2016

Another Healthcare Ransomware Attack in California

WatchPoint - Tip of the Week - Lessor Known File Extension Tricks Used By Hackers

5 Lessons for Every Law Firm Starter

Starting an Independent Insurance Agency

10 Network Security Steps For Every Small Business

Top 5 Ways To Keep Your Insurance Clients

How To Scale Your Financial Advisor Business

How To Keep Clients at Your Law Firm

The Top 5 Game-Changers for All Successful Financial Advisors

Best Ransomware Protection

How To Start Your Own Insurance Business

Steps to Protect Your Network From Ransomware Attacks

Why Didn’t My Antivirus Detect Ransomware?

How To Raise Your Retention Rate For Your Financial Services Clients

Patch Tuesday

CrypMIC Ransomware

WatchPoint - Tip of the Week - Enumerate File Shares With Powershell

How To Succeed As A New Entrepreneur

How To Start Your Own Financial Services Business

Things Every Newbie Needs to Know About Starting a Business

The Top 8 Digital Marketing Trends for Law Firms in 2016

Five Things You Should Know Before Starting Your Own Law Firm

How To Start Your Own Insurance Business

Cerber, Zepto Virus, and TeslaCrypt - Ransomware Update

Voter Databases Breached in Illinois and Arizona

5 Ways to Protect Your Facebook Account

WatchPoint - Tip of the Week – Recover Windows Activation Key

Deception Technology in Action - CryptoStopper Bait Files Deceive Ransomware

WatchPoint - Tip of the Week - Password Expiry Email Notification

Banks Saving Bitcoins for Ransomware Payments

RDP Brute Force Attack Detection and Blacklisting with Powershell

Russian Cybergang Hacks Payment System

CryptoStopper.io Demo – Isolate and Defeat TeslaCrypt Ransomware

WatchPoint - Tip of the Week - Account Lockout Detection and Notification

White House Releases Color-Coded Scale for Cybersecurity Threats

Ransomware Variant Won’t Decrypt Files After Ransom Paid

Employee Emergency Notifications

U.S. Voter Registration Database for Sale

FOR SALE - Zero-Day Exploits

How Safe Are Your Medical Records?

Tip of the Week - Using NMAP to Find and Close Open Server Ports

Cover-up: FDIC Hacked by Chinese Spies

Pokémon GO: Safe to Download or Not?

Wendy’s Hack Bigger Than Originally Thought

Zepto Virus - The Newest Form of Ransomware

2016 Cybersecurity Statistics: A Review of the First Half of 2016

What is Deception Technology?

Public Wi-Fi: Great Idea or Security Risk?

What can you learn from DNC's recent hack?

Tips on Training Employees on the Dangers of Cyberthreats

Ransomware Kits: The Newest Tool for Cyber Criminals

Even Mark Zuckerberg has Password Fatigue

Reset Windows Server 2012 Domain Administrator Password

Passwords:  Don't Leave Your Front Door Wide Open

Protection Not Prevention

Why Didn’t My Antivirus Detect Cerber Ransomware?

Refusal to Upgrade to Windows 10 Putting Millions at Risk of Malware Infection

Over 400 Million Affected in Latest Hacks

EDR | EndPoint Detection and Response

Ransomware and Data Theft

How to Protect Personally Identifiable Information from Ransomware Attacks

The Comeback of the Honeypot

Ransomware 2.0: What's Next?

Introducing CryptoStopper

Hospital Paid the Ransom, but the Criminals Didn’t Decrypt the Files

TeslaCrypt Encryption Key Released

Ransomware Destroying Businesses; How Do You Stop It?

How WatchPoint Helps Small Businesses Fight Ransomware

Employees: The Weakest Link in Cybersecurity

Past Due Bill or Ransomware?

Ransomware, and the Big Heist

Sextortion and the Consequences of Getting Caught With Your Pants Down

Watchpoint (New) Intro Video

FBI Releases Article on Ransomware

Why Signature Based AntiVirus Solutions Fail to Detect Crypto Ransomware

CryptoStopper FAQ

Shodan Demonstrates Why Closing Unused IoT Ports is Critical to Cyber Security

2016 Cyber Security Statistics

How to Deceive Hackers into Exposing Themselves

Cyber Security: The Human Security Model

Cybercriminals Target Executives with Whaling Attacks

WatchPoint to Release CryptoStopper.io May 16th

A Breakdown of Tor

How to Decrypt Jigsaw Ransomware

Urgent: Zero Day | Remove QuickTime

Dridex Banking Trojan: Malware Modified to Steal Credit Card Info

Cybersecurity Should be Top Priority for Small Business Entrepreneurs

Banking Trojans on the Rise - Becoming More Sophisticated

CEO of WatchPoint Weighed in on Cybersecurity on KCRG’s Ethical Perspectives Program Sunday April 17th

Eastern European Bank Robbers Nab $4m in 3 Days with GozNym Banking Trojan

Antivirus for CryptoWall – Why Didn’t It Work?

CEO of WatchPoint Data to Weigh in on Cybersecurity on KCRG’s Ethical Perspectives Program This Sunday

Tapping the iPhone

Roman Seleznev Set to Stand Trial

Banking Trojan Targeting Android Devices Can Bypass 2FA

What is Endpoint Detection and Response (EDR)?

Cerber: Ransomware Speaks Bitcoin Demand

CryptoJoker – Ransomware You Can Negotiate With

.om Typosquatting Malware

Ransomware: The Threat is Real

Assume Breach - A New Approach To Security

Gone Phishing: Why Human Resources is Vulnerable to Crypto Ransomware Attacks

Another Hospital Becomes Victim of Ransomware

Why Didn’t My AntiVirus Detect Cryptowall….again!?

Lock Down Exchange from Brute-Force Attack

Defenseless Against Cryptowall…Or Are We?

Threat Detection For The On-the-Go Workforce

Threat Detection - Cloud Hosted vs In-house

The Life of IT: CryptoWall

Malware: Coming of Age

Tips to Help Stop a Brute-force Attack

The Established Threat of Passwords

Locking Your Kid's Credit

Fast Facts Regarding Linux Root User

When Failure to Act Results in a Compromised Network – A Sad Cryptolocker Tale

Ransom32: The First JavaScript Ransomware

Top 4 No-Cost Ways to Secure Your Network

How Many of Your Employees Will Get Phished Today?

Adapt or get Hacked - It takes a Village to Secure a Network

New Banking Trojans Emerge with the Death of the Dyre Virus

The Golden Hour of Cyber Security

Endpoints are the New Perimeter –How Endpoint Security Can Protect Your Business

The $3.6 Million Dollar Ransom –  Learn from the Mistakes of Others

Hospital Becomes Victim of Ransomware Attack

The Absolute Worst Way to Repair Your Reputation After a Hack

Top Threats Still the Same - 2015 Verizon Data Breach Report Review

Small Businesses Becoming Big Targets

Dyre Circumstances

A Simple Introduction to the Dyre (Dyreza) Banking Trojan

Galois Awarded Contract to Combat DDoS Attacks

Cyber Liability Insurance: Read the Fine Print

Passwords, Passwords, Everywhere

Why I’m breaking up with my Antivirus Software

How to Safely Download Software

Dyre Banking Trojan Explained

The Supply Chain Planets Align for a Cyber Security Storm

Top 7 Cyber Crime Threats for 2016

Why you should worry about Application Security

Will US Technology Companies Hand Over Encryption Keys To The U.S. Government?

Cyber Attacks:  The Cost to Big Businesses

Cyber Crime Against the Small Business

Why Closing Unused Server Ports is Critical to Cyber Security

Why Didn't My AntiVirus Detect CryptoWall?

Banks Say “TOO BAD” when Hackers Steal MILLIONS from Business Accounts

ISIS. The Cyber Security Nightmare

Using Carbon Black to Defeat a Spear Phishing Attack

Cyber Monday brings Cybercrime

What is the Darknet?

Carbon Black - Cybercriminal Payback Time

Chinese Hacking and State Sponsored Computer Hacking

There is Nothing You Can Do

CryptoWall 4.0

Welcome to the World of Modern Cybercrime

Cyber Liability Insurance: Denied

Why Your Network Isn't Ready

Power Grid Cyberattack is Imminent

Is the IoT the Next Big Threat?

Jesse James would love Sphinx, Brolux & Dridex

Raytheon Awarded $1 Billion Contract

Malvertising - You don't even have to click it

What is Blacklisting?

XcodeGhost - What? an iPhone hack?

Stealing Your Money - Sphinx Banking Trojan

U.S. Officials Praise Chinese Hackers

LifeLock: 100% Not Guaranteed

The Federal Trade Commission - Enforcing the Next Generation of Cybersecurity

Next on the Hacker Horizon - Your CAR!

How to be a Hacker

Pick up the phone! $2.5 million dollars is on the line!

The Wild West Returns - Why We Need John Wayne and His Partner Carbon Black

I like big patches and I cannot lie

Ashley Madison Database Leaked

An Advanced Persistent Threat, Coming to a Server Near You!

Top Five Quick Wins to Secure a Network

Data Breach Reporting Laws

Stagefright Android Attack

United Airlines Security Breach

Cheaters Exposed in Latest Hack

CryptoWall Ransomware Still Running Rampant

IP Address Shortage: What's Next?

Cyber Security Landscape - July 9, 2015

Hawkeye – not just my favorite college team anymore

The Cyber Security Landscape Software Vulnerabilities – June 23, 2015

Five Cybercrime Considerations That Should Keep CEOs Up At Night

The Cyber Security Landscape – June 17, 2015

Kaspersky Duqu 2.0 Hack

Ransomware: It's As Easy As 1, 2, 3

Bot Phishing?

Office of Personnel Management Latest Target of Data Breach

Stolen Personally Identifiable Information Loses IRS Millions

Data Leakage: Patch Your Way to Success Data Loss Prevention Made Easy

Cyber Security Threats and Data Loss: Hacker Attacks on SMB Organizations

Using Patch Management to Keep on Top of Software Vulnerabilities

What’s Happened to Anti-Virus Software? Can Patch Management Save the Day?

Why You Need Patching

Be Afraid, Be Very Afraid…

CryptoWall 3.0: Breaking the Walls Down

Zero Hour for Zero Day Hackers

Hacker's Fake Public WiFi Connections to Access Your Device

Anthem Inc., Breached

Undetected Hacks Impacting Your Productivity?

Security Questions Expose Personal Information to Cyber Criminals

Cyber Security Companies for Small Business

Using Fingerprint Readers to Enhance Company Security

Optimal Cyber Security Programs through Best Practices

Potential Security Breaches are Everywhere

Network Security Experts you know by Name

Zero-Day Vulnerability Affects Adobe Flash

The Most Popular Forms of Social Engineering

Ransomware - Crypto Locker 2.0

Hardening Exchange Server