Business Cyber Security delivered via Cloud
Free Call:
Email:
Company Address:
116 Gawler Place
Adelaide SA 5000
Postal Address:
PO Box 1235,
Glenelg South SA 5044
Copyright © 2024 | Magnetic Alliance Cyber Pty Ltd | Designed by Magnetic Alliance
1m computers affected, $US70m ransomware demand – Ransomware as a Service made scalable by means of a supply chain attack!
Similar to the Solarwinds hack last year, cyber criminals managed to infiltrate the systems of a managed IT services software provider, in this instance Kaseya.
Once in there, a management software “update” was deployed to 1m+ computers according to the hackers and ransomware was pushed through it to hundreds of medium businesses.
It’s a great example that demonstrates why there is never 100% of cyber protection. BUT, a business has to do better than the 47% antivirus alone provides. Our Jam Cyber Security Framework delivers 95.8%. Double your Cyber Security today! https://lnkd.in/d7KRs_h
Full (technical) article about the latest hack on July 4th: https://lnkd.in/dwhXDQZ
You may also be interested in:
What is Ransomware?
What is Application Hardening?
What are Administrative Privileges?
What is Multifactor Authentication?
What are Man-in-the-Middle Attacks?
Check out our YouTube channel: Jam Cyber – YouTube Channel
Related Posts:
How and Why to Block HTM/HTML Attachments in Outlook 365
How and Why to Block HTM/HTML Attachments in Outlook 365 Microsoft Outlook 365 is one of the most popular business
Building a Positive Cyber Security Culture
Building a Positive Cyber Security Culture A successful cyber security culture starts at the top. We often hear the term
Understanding Administrative Privileges: A Guide for Small Business Owners
Understanding Administrative Privileges: A Guide for Small Business Owners What Are Administrative Privileges? Administrative privileges on computers, simply put, are
Fake Invoice Scams: How to Protect Your Business & Your Customers
Fake Invoice Scams: How to Protect Your Business & Your Customers Fake invoice scams involve the unauthorised sending of invoices
Recent Posts
Categories