How to determine the true cost of a ransomware attack

Learn about several factors that add to the total cost of a ransomware attack.

The 6 stages of an Advanced Ransomware Threat attack

Cybersecurity expert Eric Vanderburg dissects a typical Advanced Ransomware Threat attack. Keep reading to learn more.

Ransomware threatens Linux servers, especially web servers

Cybercriminals are targeting Linux users with ransomware. Learn what to look out for and how to protect yourself today.

Tabletop simulation exercises speed up ransomware response

Cybersecurity expert Eric Vanderburg explains how tabletop simulation exercises can help your business get ready for ransomware.

4 questions to ask before launching a data protection strategy

Ask yourself these four questions before launching a ransomware protection strategy at your organization.

Mac users face increased ransomware threats

Apple is known for building secure devices, but don't get too complacent because ransomware attacks against Mac users are on the rise. Learn about the latest threats.

Karmen ransomware makes it easy for cybercriminals to launch attacks

A do-it-yourself software kit called Karmen allows just about anyone to launch ransomware attacks against businesses. Learn more.

Ransomware extortionists not as trustworthy as they’d have you believe

You can pay the ransom following a ransomware attack, but you may not get your data back. That's why you need a solid backup and recovery strategy.

Ransomware Recovery: How to meet realistic Recovery Time Objectives (RTOs)

Get tips on how to create a recovery plan for the data and applications your business depends on.

Spora ransomware could become a major player

Spora ransomware is relatively new, but its advanced capabilities indicate that it's poised to hit the big time. Read on to learn more.