2017 Cybersecurity in Review

Jordan Kadlec

 

Read More

Should I be worried about the WPA2 vulnerability 'Krack'?

Greg Edwards

  Yes, until your specific device is patched, you are vulnerable to attack.

Read More

NIST 800-63b Password Guidelines Surprises

Chris Hartwig

  NIST released new guidelines for user password requirements that are significantly different than those you may be used to following. For anyone keeping up with identity management guidelines over…

Read More

Cybersecurity Q&A with WatchPoint CEO, Greg Edwards

Jordan Kadlec

Cyberattacks, data breaches, malware, ransomware - these aren’t new to the headlines, yet the frequency of these incidents and the resultant focus on cybersecurity has dramatically increased.  Why…

Read More

Ransomware Removal

Greg Edwards

Removing ransomware is a multi-step process.  

Read More

Why You Should Change Your Passwords

Jordan Kadlec

Almost exactly a year after Yahoo announced they suffered the largest data breach to-date, officials corrected the estimated number of users affected in a statement released on October 3rd. The…

Read More

What Usually Happens In a Ransomware Attack

Chris Hartwig

    So, you got hit with ransomware today. You know…. that thing you’ve been hearing about that encrypts your data and holds it for a bitcoin ransom? You were so sure ransomware would never infect…

Read More

45 New Decryptors added to the Free Ransomware Decryptors

Chris Hartwig

Cybercriminals have been busy creating thousands of new ransomware variants over the past few months which they have used to steal hundreds of thousands of dollars from unsuspecting companies all…

Read More

Different Types of Ransomware

Jordan Kadlec

As we near the end of the third quarter of 2017, let’s take a look back at the key points from the major cyber incidents that have occurred over the last nine months. Serial entrepreneur and CEO of…

Read More