Ransomware extortionists not as trustworthy as they’d have you believe

You can pay the ransom following a ransomware attack, but you may not get your data back. That's why you need a solid backup and recovery strategy.

Ransomware Recovery: How to meet realistic Recovery Time Objectives (RTOs)

Get tips on how to create a recovery plan for the data and applications your business depends on.

Spora ransomware could become a major player

Spora ransomware is relatively new, but its advanced capabilities indicate that it's poised to hit the big time. Read on to learn more.

How to create a BYOD policy that keeps your business data secure

Learn to create a BYOD policy that works for your business in three steps.

The top 10 ransomware attack vectors

Ransomware is infecting the computers of unsuspecting victims at an astronomical rate. The various methods that cybercriminals use to take over a machine and encrypt its digital files are called

How ransomware extortionists hide their tracks

Security expert Eric Vanderburg takes readers inside the mind of a cybercriminal. Learn how ransomware extortionists stay hidden and avoid prosecution.

Resume Ransomware: GoldenEye targets hiring managers, recruiters and HR

People charged with filling career positions at their companies need to be on the lookout for ransomware—especially GoldenEye ransomware. Learn more.

PopcornTime offers victims a choice: Pay the ransom or infect your friends

PopcornTime is a newly-discovered form or ransomware that operates off a disturbing principle. Learn more.

Ransomware distributor gets hacked: A look behind the curtain

The cybercriminal behind the San Francisco Municipal Transportation Agency ransomware attack got hacked by a security researcher. Find out what he learned.

The psychology of a ransomware attack: A guide to what makes victims click

Cybercrime is very much a psychological game and ransomware is no exception. Find out what motivates victims to click on malicious links.