1m computers affected, $US70m ransomware demand – Ransomware as a Service made scalable by means of a supply chain attack!
Similar to the Solarwinds hack last year, cyber criminals managed to infiltrate the systems of a managed IT services software provider, in this instance Kaseya. Once in there, a management software “update” was deployed to 1m+ computers according to the hackers and ransomware was pushed through it to hundreds of medium businesses.
It’s a great example that demonstrates why there is never 100% of cyber protection. BUT, a business has to do better than the 47% antivirus alone provides. Our Jam Cyber Security Framework delivers 95.8%. Double your Cyber Security today! https://lnkd.in/d7KRs_h
1m computers affected, $US70m ransomware demand – Ransomware as a Service made scalable by means of a supply chain attack!
Similar to the Solarwinds hack last year, cyber criminals managed to infiltrate the systems of a managed IT services software provider, in this instance Kaseya.
Once in there, a management software “update” was deployed to 1m+ computers according to the hackers and ransomware was pushed through it to hundreds of medium businesses.
It’s a great example that demonstrates why there is never 100% of cyber protection. BUT, a business has to do better than the 47% antivirus alone provides. Our Jam Cyber Security Framework delivers 95.8%. Double your Cyber Security today! https://lnkd.in/d7KRs_h
Full (technical) article about the latest hack on July 4th: https://lnkd.in/dwhXDQZ
You may also be interested in:
What is Ransomware?
What is Application Hardening?
What are Administrative Privileges?
What is Multifactor Authentication?
What are Man-in-the-Middle Attacks?
Check out our YouTube channel: Jam Cyber – YouTube Channel
Related Posts:
Know your legal obligations
Do you know your legal and ethical obligations if your business experiences a cyber attack? A cyber attack can be
10 Ways to ensure your business is protected from the Log4j vulnerability
10 ways to ensure your business is protected from the Log4j vulnerability In December 2021, a vulnerability was discovered in
Australian Cyber Security Centre Warning
Australian Cyber Security Centre warning Australia may end up in cyber warfare “crossfire” according to a warning from the Australian
Cyber Security Policies and Procedures
#Cybersecurity is not just about software, tools, and systems. Having clear policies and procedures in place for your business can greatly
Recent Posts
Archives
Categories