Ransomware is a type of malware that will lock you out of your files, device, or other resources, and demand a payment to regain access. Even if you choose to pay up, most often the payment will not result in gaining back access, and your files are permanently lost.
The threat posed by Ransomware is serious, and ongoing. I last updated this article in September 2015, not long after Cryptolocker became the first widely reported Ransomware threat with thousands of infected computers and resulting in the loss of millions of dollars of data and production. The problem has only increased in frequency and severity with a range of new variants attacking customers across PC and other platforms.
We see the pattern time and again. “Everyone” agrees that a new technology will transform business and you must be part of it or risk being left behind. Businesses caught up in the hype rush to implement optimistic and poorly thought out projects. Something goes wrong resulting in massive costs and reputational damage. Finally, we take a more cautious and realistic approach to building the new technology into our business models and the technology starts to meet its early promise.
Such is Enterprise mobility. The notebook, smartphone, and broadband wireless are enabling technologies, allowing us to break away from the office and have accelerated a transformation of how we think of the workplace. Benefits from anywhere access to data and tools include a boost to productivity, improved customer service, and flexibility for employees. The concept appears to be a clear win/win with evangelist’s spruiking the undeniable benefits, but often ignoring the security implications. We are a long way down the road to mobile maturity, but we are not quite there yet. Read more
OpenDNS offers a suite of Internet filtering and security features targeted at levels from the home environment to corporates. The service works by replacing the Internet’s standard address book system (DNS) with a custom service which then allows you to limit, track, and manage access to the Internet and to help protect your staff and family from malware, phishing, and inappropriate content. Read more
OK, not God, but the computer equivalent, the almighty Administrator.
Home computer users start up their computer and do stuff. If you want to run a program, you can. If you want to install a program, you can. If you want to change some setting, you can. Because this is how it has always been for most users, we think nothing of it and assume it’s normal.
We want to get things done so why would you restrict what can be done by the all powerful User.
It turns out there are good reasons.