JamCyber...

Blog

Ransomware hackers find vulnerable target in U.S. grain supply

Ransomware hackers find vulnerable target in U.S. grain supply Another day, another (Agri) ransomware cyberattack. This time the US grain supply chain. Strange, when application whitelisting alone could reduce email and download induced ransom attacks to 99% ... Would you like to know more? Check out our website https://jamcyber.com/ Full NBN article here: https://lnkd.in/duFUBPNj You may [...]
Read more

Cyber CEO – DNS Based Protection or WebProtect

Cyber CEO – DNS Based Protection or WebProtect Cyber CEO Short videos explaining things around cyber threats and cyber security for small and medium business. This session asks "What is DNS Based Protection or WebProtect?" You may also be interested in: What are the ACSC Essential 8? What is Ransomware? What is Multifactor Authentication? What [...]
Read more

Cyber CEO – Next Generation Antivirus

Cyber CEO – Next Generation Antivirus Cyber CEO short videos explaining things around cyber threats and cyber security for small and medium business. This session asks "What is Next Generation Antivirus (or Endpoint Detection and Response)?" You may also be interested in: What are the ACSC Essential 8? What is Ransomware? What is Multifactor Authentication? [...]
Read more

Biggest Cryptocurrencies hack in history (to date)

Biggest Cryptocurrencies hack in history (to date). Is Blockchain really un-hackable? Crypto operators are NOT: US$600m went AWOL yesterday when Poly Network was hacked! Biggest cryptocurrencies hack in history (to date). If global crypto networks can be hacked, how easy is it to break into your business IT and cloud systems? Find out today with [...]
Read more

Cyber CEO – What are the ACSC Essential 8

Cyber CEO – What are the ACSC Essential 8 Cyber CEO short videos explaining things around cyber threats and cyber security for small and medium business. This session asks "What are the ACSC Essential 8?" What is Ransomware? What is Application Whitelisting? What is Application Hardening? What is Multifactor Authentication? What are Administrative Privileges? What [...]
Read more

Multifactor Authentication MFA – 2FA for email account protection

Multifactor Authentication (MFA / 2FA) for email account protection. Your email account is the crown jewels equivalent of ID theft and cyber attacks. Which is why (often free) Multifactor Authentication MFA / 2FA is a MUST for your email account! One day, your or an employees email credentials will leak or be guessed and then [...]
Read more
Have questions? Search our knowledgebase.