<?xml version="1.0" encoding="UTF-8" ?><!-- generator=Zoho Sites --><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><atom:link href="https://www.actisofttechnology.com/blogs/tag/ransomware/feed" rel="self" type="application/rss+xml"/><title>ActiSoft Technology - Blog #Ransomware</title><description>ActiSoft Technology - Blog #Ransomware</description><link>https://www.actisofttechnology.com/blogs/tag/ransomware</link><lastBuildDate>Thu, 23 Apr 2026 07:46:55 +0200</lastBuildDate><generator>http://zoho.com/sites/</generator><item><title><![CDATA[Top Cyber Threats to SMEs]]></title><link>https://www.actisofttechnology.com/blogs/post/top-cyber-threats-to-smes-in-2022....and-more-than-likely-beyond</link><description><![CDATA[<img align="left" hspace="5" src="https://www.actisofttechnology.com/Images/Small/iStock-479801072 -1-.jpg"/>If you’re running a small to medium sized business, it’s easy to think that you might not be a big enough fish to attract the interest of cyber crimin ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_uxWrIAHjQsyZ1nFmh4MeZw" data-element-type="section" class="zpsection "><style type="text/css"> [data-element-id="elm_uxWrIAHjQsyZ1nFmh4MeZw"].zpsection{ border-radius:1px; } </style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_ZlAznbvKStivVXW8WAVMyw" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"> [data-element-id="elm_ZlAznbvKStivVXW8WAVMyw"].zprow{ border-radius:1px; } </style><div data-element-id="elm_m2v5V-UYSfKXTcz8OTuO6A" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"> [data-element-id="elm_m2v5V-UYSfKXTcz8OTuO6A"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_1vqchQpK6wvaX1moa5UKrg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_1vqchQpK6wvaX1moa5UKrg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div style="color:inherit;"><div>If you’re running a small to medium sized business, it’s easy to think that you might not be a big enough fish to attract the interest of cyber criminals. But the truth is, small organisations are just as much at risk of hacks and other security threats as huge corporations – in fact, being smaller may make you more of a target.&nbsp;</div><br><div>Attackers are targeting thousands of businesses every day, and those with less robust defences in place make much easier prey than bigger organisations who can invest more time and money into cyber security.&nbsp;</div><br><div><div>Hackers also love <a href="https://www.webroot.com/blog/2022/02/10/3-reasons-we-forget-small-midsized-businesses-are-major-targets-for-ransomware/" title="targeting small businesses" target="_blank" rel="">targeting small businesses</a> because they often deal with large sums of money and have great contacts – which means there’s lots of lovely data to steal.</div></div><br><div>It's often said that knowledge is power, and that’s certainly true when it comes to cyber-crime. The owners and managers of SMEs need to be aware of the risks, which is why we’ve put together this short article outlining the most common cyber-attacks right now and what we have seen.</div></div></div></div>
</div><div data-element-id="elm_ZM1AzWW6MV2O2JPB09RAgg" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> @media (min-width: 992px) { [data-element-id="elm_ZM1AzWW6MV2O2JPB09RAgg"] .zpimagetext-container figure img { width: 500px ; height: 531.41px ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_ZM1AzWW6MV2O2JPB09RAgg"] .zpimagetext-container figure img { width:500px ; height:531.41px ; } } @media (max-width: 767px) { [data-element-id="elm_ZM1AzWW6MV2O2JPB09RAgg"] .zpimagetext-container figure img { width:500px ; height:531.41px ; } } [data-element-id="elm_ZM1AzWW6MV2O2JPB09RAgg"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="" data-size-mobile="" data-align="right" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimagetext-container zpimage-with-text-container zpimage-align-right zpimage-size-medium zpimage-tablet-fallback-medium zpimage-mobile-fallback-medium "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="/compliance-manager" target="_blank" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Images/Small/iStock-679718274.jpg" width="500" height="531.41" loading="lazy" size="medium" data-lightbox="false"/></picture></a></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div><span style="font-size:24px;font-weight:400;">1) Phishing&nbsp;</span></div><br><div><span style="font-size:18px;">By far the most prevalent – and damaging – threat facing small and medium sized businesses in 2022 is phishing. These attacks account for 90% of all breaches; a figure that’s grown by 65% since 2021. Phishing attacks are when a hacker sends an email pretending to be from trusted contact, tricking the recipient to click on a malicious link, download a code or share sensitive information. There are several types of phishing attacks you need to know about:</span></div><br><div><ul><li><span style="font-size:18px;">The spray and pray approach, which is where hackers send out thousands of emails all at once, in the hope that one or two will bite</span></li><li><span style="font-size:18px;">Spear phishing: a campaign that targets a particular person or organisation and includes information which is known to be of interest to the specific target</span></li><li><span style="font-size:18px;">Whaling: an even more targeted and carefully executed attack, where the hacker goes after a specific C level executive in the organisation&nbsp;</span></li></ul></div><br><div><span style="font-size:18px;">Phishing attacks are becoming increasingly sophisticated, which means that even if you think you’ve seen it all before, you could still be caught out.</span></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div>
</div></div><div data-element-id="elm_F66Pi-ivj0C7En0OG3Hcyg" data-element-type="divider" class="zpelement zpelem-divider "><style type="text/css"> [data-element-id="elm_F66Pi-ivj0C7En0OG3Hcyg"].zpelem-divider{ border-radius:1px; } </style><style> [data-element-id="elm_F66Pi-ivj0C7En0OG3Hcyg"] .zpdivider-container .zpdivider-common:after, [data-element-id="elm_F66Pi-ivj0C7En0OG3Hcyg"] .zpdivider-container .zpdivider-common:before{ border-color:#000000 } </style><div class="zpdivider-container zpdivider-line zpdivider-align-center zpdivider-width100 zpdivider-line-style-solid "><div class="zpdivider-common"></div>
</div></div><div data-element-id="elm_9JxxX_lP0mzNVkOLHdgnWg" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_9JxxX_lP0mzNVkOLHdgnWg"].zprow{ border-radius:1px; } </style><div data-element-id="elm_nxxtnEMDQWtSWQqlzIINsg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_nxxtnEMDQWtSWQqlzIINsg"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_f3eZhHwZtFBU8rjaCpuQiA" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> @media (min-width: 992px) { [data-element-id="elm_f3eZhHwZtFBU8rjaCpuQiA"] .zpimagetext-container figure img { width: 500px ; height: 333.56px ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_f3eZhHwZtFBU8rjaCpuQiA"] .zpimagetext-container figure img { width:500px ; height:333.56px ; } } @media (max-width: 767px) { [data-element-id="elm_f3eZhHwZtFBU8rjaCpuQiA"] .zpimagetext-container figure img { width:500px ; height:333.56px ; } } [data-element-id="elm_f3eZhHwZtFBU8rjaCpuQiA"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="" data-size-mobile="" data-align="left" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimagetext-container zpimage-with-text-container zpimage-align-left zpimage-size-medium zpimage-tablet-fallback-medium zpimage-mobile-fallback-medium hb-lightbox " data-lightbox-options="
            type:fullscreen,
            theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Images/Small/iStock-693352614.jpg" width="500" height="333.56" loading="lazy" size="medium" data-lightbox="true"/></picture></span></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><div style="color:inherit;"><div style="color:inherit;"><div><span style="font-size:24px;">2) Ransomware&nbsp;</span></div><br><div><span style="font-size:18px;">Ransomware is a type of malicious software which prevents or restricts users from accessing their computer systems and data, commonly by locking their screens and/or files until they pay a ransom. Like other cyber-attacks, ransomware technology has become more sophisticated over recent years. A popular attack at the moment is a breed of ransomware known as “cryptoransomware” where files are encrypted and users are forced to send an online payment in return for a decryption code.</span></div><br><div><span style="font-size:18px;">Hackers will push for payments in all sorts of ways, though. The costs vary according to the type of ransomware being used and different exchange rates. Users are often asked to pay their ransoms in bitcoin, because it offers a greater level of anonymity, but hackers also list alternative options such as Amazon gift cards or iTunes vouchers. Sometimes it seems like an easy option to just pay up, but it should be noted that paying the ransom is no guarantee your files will be returned.</span></div></div></div></div>
</div></div><div data-element-id="elm_yXBiAnjFZGHyul8TiuG0JQ" data-element-type="divider" class="zpelement zpelem-divider "><style type="text/css"> [data-element-id="elm_yXBiAnjFZGHyul8TiuG0JQ"].zpelem-divider{ border-radius:1px; } </style><style> [data-element-id="elm_yXBiAnjFZGHyul8TiuG0JQ"] .zpdivider-container .zpdivider-common:after, [data-element-id="elm_yXBiAnjFZGHyul8TiuG0JQ"] .zpdivider-container .zpdivider-common:before{ border-color:#000000 } </style><div class="zpdivider-container zpdivider-line zpdivider-align-center zpdivider-width100 zpdivider-line-style-solid "><div class="zpdivider-common"></div>
</div></div></div></div><div data-element-id="elm_OskkLb6t4OhaCYamgKZmvA" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> @media (min-width: 992px) { [data-element-id="elm_OskkLb6t4OhaCYamgKZmvA"] .zpimagetext-container figure img { width: 500px ; height: 333.56px ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_OskkLb6t4OhaCYamgKZmvA"] .zpimagetext-container figure img { width:500px ; height:333.56px ; } } @media (max-width: 767px) { [data-element-id="elm_OskkLb6t4OhaCYamgKZmvA"] .zpimagetext-container figure img { width:500px ; height:333.56px ; } } [data-element-id="elm_OskkLb6t4OhaCYamgKZmvA"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="" data-size-mobile="" data-align="right" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimagetext-container zpimage-with-text-container zpimage-align-right zpimage-size-medium zpimage-tablet-fallback-medium zpimage-mobile-fallback-medium "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="https://info.knowbe4.com/password-exposure-test-partner?partnerid=0010c00001ywD8SAAU" target="_blank" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Images/Small/iStock-621493344.jpg" width="500" height="333.56" loading="lazy" size="medium" data-lightbox="false"/></picture></a></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><div style="color:inherit;"><div><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div><span style="font-size:24px;">3) Social Engineering&nbsp;</span></div><br><div><div><span style="font-size:18px;">Social engineering <a href="https://blog.knowbe4.com/we-do-not-talk-enough-about-social-engineering-and-its-hurting-us" title="plays a huge role" target="_blank" rel="">plays a huge role</a> in cyber-crime. Even though advances in technology have been behind more sophisticated attacks, those attacks can only be properly deployed by a human. So, hackers work hard to understand how people think and manipulate them into making security mistakes or sharing valuable data. Social engineering happens in several phases. First, the hacker investigates their victim and identifies any weaknesses in their security systems. Next they start to gain their trust, either by sharing information the victim might be interested in or by pretending to be a trusted contact. Then, when the target lets their guard down and begins to trust the hacker, they’ll go in for the kill.&nbsp;</span></div></div></div></div></div></div></div><div><div style="color:inherit;"></div></div></div></div>
</div></div><div data-element-id="elm_qzZGWuwaDuQcUCQy2nRgiw" data-element-type="divider" class="zpelement zpelem-divider "><style type="text/css"> [data-element-id="elm_qzZGWuwaDuQcUCQy2nRgiw"].zpelem-divider{ border-radius:1px; } </style><style> [data-element-id="elm_qzZGWuwaDuQcUCQy2nRgiw"] .zpdivider-container .zpdivider-common:after, [data-element-id="elm_qzZGWuwaDuQcUCQy2nRgiw"] .zpdivider-container .zpdivider-common:before{ border-color:#000000 } </style><div class="zpdivider-container zpdivider-line zpdivider-align-center zpdivider-width100 zpdivider-line-style-solid "><div class="zpdivider-common"></div>
</div></div><div data-element-id="elm_V17cgQAqHHjWBhMYGnX3mA" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> @media (min-width: 992px) { [data-element-id="elm_V17cgQAqHHjWBhMYGnX3mA"] .zpimagetext-container figure img { width: 500px ; height: 374.82px ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_V17cgQAqHHjWBhMYGnX3mA"] .zpimagetext-container figure img { width:500px ; height:374.82px ; } } @media (max-width: 767px) { [data-element-id="elm_V17cgQAqHHjWBhMYGnX3mA"] .zpimagetext-container figure img { width:500px ; height:374.82px ; } } [data-element-id="elm_V17cgQAqHHjWBhMYGnX3mA"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="" data-size-mobile="" data-align="left" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimagetext-container zpimage-with-text-container zpimage-align-left zpimage-size-medium zpimage-tablet-fallback-medium zpimage-mobile-fallback-medium "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="https://info.knowbe4.com/password-exposure-test-partner?partnerid=0010c00001ywD8SAAU" target="_blank" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Images/Small/iStock-1323852923.jpg" width="500" height="374.82" loading="lazy" size="medium" data-lightbox="false"/></picture></a></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><div style="color:inherit;"><div><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div><span style="font-size:24px;">4) Insider Threat&nbsp;</span></div><br><div><div><span style="font-size:18px;">Insider threats are posed by individuals from inside an organisation. This can include current or previous staff members, partners and contractors with access to passwords and company data. These individuals may act maliciously, intentionally stealing data or infiltrating systems for personal gain, but often they’re completely unwitting. Lack of awareness about cyber security issues can turn the most diligent worker into an insider threat, so it’s important to have robust policies and training measures in place.&nbsp;</span></div></div></div></div></div></div></div></div></div><div><div style="color:inherit;"></div></div></div></div>
</div></div><div data-element-id="elm_GMwyye_Bz97zQF2TfOLKTQ" data-element-type="divider" class="zpelement zpelem-divider "><style type="text/css"> [data-element-id="elm_GMwyye_Bz97zQF2TfOLKTQ"].zpelem-divider{ border-radius:1px; } </style><style> [data-element-id="elm_GMwyye_Bz97zQF2TfOLKTQ"] .zpdivider-container .zpdivider-common:after, [data-element-id="elm_GMwyye_Bz97zQF2TfOLKTQ"] .zpdivider-container .zpdivider-common:before{ border-color:#000000 } </style><div class="zpdivider-container zpdivider-line zpdivider-align-center zpdivider-width100 zpdivider-line-style-solid "><div class="zpdivider-common"></div>
</div></div><div data-element-id="elm_xBQ6MybF5qwqNjhe6n-KxA" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> @media (min-width: 992px) { [data-element-id="elm_xBQ6MybF5qwqNjhe6n-KxA"] .zpimagetext-container figure img { width: 300px !important ; height: 250px !important ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_xBQ6MybF5qwqNjhe6n-KxA"] .zpimagetext-container figure img { width:300px ; height:250px ; } } @media (max-width: 767px) { [data-element-id="elm_xBQ6MybF5qwqNjhe6n-KxA"] .zpimagetext-container figure img { width:300px ; height:250px ; } } [data-element-id="elm_xBQ6MybF5qwqNjhe6n-KxA"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="" data-size-mobile="" data-align="right" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimagetext-container zpimage-with-text-container zpimage-align-right zpimage-size-original zpimage-tablet-fallback-original zpimage-mobile-fallback-original "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="https://info.knowbe4.com/password-exposure-test-partner?partnerid=0010c00001ywD8SAAU" target="_blank" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Images/Other/PET-300x250.jpg" width="300" height="250" loading="lazy" size="original" data-lightbox="false"/></picture></a></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><div style="color:inherit;"><div><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div><div style="color:inherit;"><div><div style="color:inherit;"><div><span style="font-size:24px;">5) Shadow IT</span></div>
<br><div><span style="font-size:18px;">Shadow IT is a term covering the use of different IT systems, apps, services and devices that haven’t been approved by an IT department. Since Cloud services have become more popular, and also since the first lockdown, the use of Shadow IT has grown exponentially. New technology drives innovation and can deliver huge cost and time savings, but without the right security measures in place it also poses a huge risk. </span></div>
<br><div><br></div></div></div></div></div></div></div></div></div></div></div><div><div style="color:inherit;"></div>
</div></div></div></div></div><div data-element-id="elm_YMPka8PIM1yThWWIy9D0NA" data-element-type="divider" class="zpelement zpelem-divider "><style type="text/css"> [data-element-id="elm_YMPka8PIM1yThWWIy9D0NA"].zpelem-divider{ border-radius:1px; } </style><style> [data-element-id="elm_YMPka8PIM1yThWWIy9D0NA"] .zpdivider-container .zpdivider-common:after, [data-element-id="elm_YMPka8PIM1yThWWIy9D0NA"] .zpdivider-container .zpdivider-common:before{ border-color:#000000 } </style><div class="zpdivider-container zpdivider-line zpdivider-align-center zpdivider-width100 zpdivider-line-style-solid "><div class="zpdivider-common"></div>
</div></div><div data-element-id="elm_rWDsyS2oO51Exb0Elfwfkw" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> @media (min-width: 992px) { [data-element-id="elm_rWDsyS2oO51Exb0Elfwfkw"] .zpimagetext-container figure img { width: 500px ; height: 374.82px ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_rWDsyS2oO51Exb0Elfwfkw"] .zpimagetext-container figure img { width:500px ; height:374.82px ; } } @media (max-width: 767px) { [data-element-id="elm_rWDsyS2oO51Exb0Elfwfkw"] .zpimagetext-container figure img { width:500px ; height:374.82px ; } } [data-element-id="elm_rWDsyS2oO51Exb0Elfwfkw"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="" data-size-mobile="" data-align="left" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimagetext-container zpimage-with-text-container zpimage-align-left zpimage-size-medium zpimage-tablet-fallback-medium zpimage-mobile-fallback-medium "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="https://info.knowbe4.com/password-exposure-test-partner?partnerid=0010c00001ywD8SAAU" target="_blank" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Images/Small/iStock-864427926.jpg" width="500" height="374.82" loading="lazy" size="medium" data-lightbox="false"/></picture></a></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><div style="color:inherit;"><div><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div><span style="font-size:24px;">6) Software Exploits</span></div><br><div><div><span style="font-size:18px;">A software exploit is a code that’s been written to take advantage of a particular vulnerability or flaw in a piece of software. Although security professionals sometimes develop these exploits as evidence of vulnerabilities, they’re also widely used by hackers with malicious intent.&nbsp;</span></div></div><br><div><br></div></div></div></div></div></div></div></div><div><div style="color:inherit;"></div></div></div></div>
</div></div><div data-element-id="elm_rxlNLk2J77PSfK5fUmonSw" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_rxlNLk2J77PSfK5fUmonSw"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p><span style="color:inherit;">The purpose of this article is to provide you with an overview of the most common threats to your organisation. We’ll go into more detail about each type (and a few others!) in our next articles. In the meantime, if you want to know more about how to protect your SME from cyber threats, get in touch!</span><br></p></div>
</div><div data-element-id="elm_wcIqD_jrWIL3pG99sFQ0Ag" data-element-type="divider" class="zpelement zpelem-divider "><style type="text/css"> [data-element-id="elm_wcIqD_jrWIL3pG99sFQ0Ag"].zpelem-divider{ border-radius:1px; } </style><style> [data-element-id="elm_wcIqD_jrWIL3pG99sFQ0Ag"] .zpdivider-container .zpdivider-common:after, [data-element-id="elm_wcIqD_jrWIL3pG99sFQ0Ag"] .zpdivider-container .zpdivider-common:before{ border-color:#000000 } </style><div class="zpdivider-container zpdivider-line zpdivider-align-center zpdivider-width100 zpdivider-line-style-solid "><div class="zpdivider-common"></div>
</div></div><div data-element-id="elm_u3hJ-CTfVPi4KmS61br2Hg" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_u3hJ-CTfVPi4KmS61br2Hg"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-center " data-editor="true"><span style="color:inherit;">Are your users putting a big target on your organisation’s back?</span><br></h2></div>
<div data-element-id="elm_oCZY4nh3u_YRXAYbn7EnOQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_oCZY4nh3u_YRXAYbn7EnOQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div style="color:inherit;"><div>Cybercriminals are constantly coming out with new ways to hack into your network and steal your organisation’s confidential information.</div><div><br></div><div><div style="color:inherit;"><div><div><span style="font-weight:700;font-style:italic;">Find out if your users are putting a big target on your organisation’s back.</span></div></div><div><br></div><div><div><span style="font-weight:700;">KnowBe4’s new Password Exposure Test (PET)</span> is a complimentary IT security tool that allows you to run an in-depth analysis of your organisation’s hidden exposure risk associated with your users.</div></div><div><br></div><div><div>PET makes it easy for you to identify users with exposed emails publicly available on the web, and checks your Active Directory to see if they are using weak or compromised passwords that are part of a known data breach. PET then reports on any user accounts affected <span style="font-weight:700;">so you can take action immediately!</span></div></div></div></div></div></div></div>
</div><div data-element-id="elm_srkt-xsmeFqr9pVJSfK8pA" data-element-type="imageheadingtext" class="zpelement zpelem-imageheadingtext "><style> @media (min-width: 992px) { [data-element-id="elm_srkt-xsmeFqr9pVJSfK8pA"] .zpimageheadingtext-container figure img { width: 299px !important ; height: 254px !important ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_srkt-xsmeFqr9pVJSfK8pA"] .zpimageheadingtext-container figure img { width:299px ; height:254px ; } } @media (max-width: 767px) { [data-element-id="elm_srkt-xsmeFqr9pVJSfK8pA"] .zpimageheadingtext-container figure img { width:299px ; height:254px ; } } [data-element-id="elm_srkt-xsmeFqr9pVJSfK8pA"].zpelem-imageheadingtext{ border-radius:1px; } </style><div data-size-tablet="size-original" data-size-mobile="size-original" data-align="right" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimageheadingtext-container zpimage-with-text-container zpimage-align-right zpimage-size-original zpimage-tablet-fallback-original zpimage-mobile-fallback-original "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="https://info.knowbe4.com/password-exposure-test-partner?partnerid=0010c00001ywD8SAAU" target="_blank" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Images/Other/Password%20Exposure%20Test%20Screen.png" width="299" height="254" loading="lazy" size="original" data-lightbox="false"/></picture></a></figure><div class="zpimage-headingtext-container"><h3 class="zpimage-heading zpimage-text-align-left " data-editor="true"><span style="font-weight:700;">Here's how it works:</span></h3><div class="zpimage-text zpimage-text-align-left " data-editor="true"><div><ul><li><span style="color:inherit;font-size:18px;">Checks to see if any of your organisations email addresses have been <span style="font-weight:700;">part of a data breach</span></span><br></li><li><span style="color:inherit;font-size:18px;">Tests against <span style="font-weight:700;">1</span><span style="font-weight:700;">0 types of weak password</span> related threats associated with user accounts</span><br></li><span style="font-size:18px;"><li><span style="color:inherit;"><span style="color:inherit;"><span style="color:inherit;">Checks against breached or weak passwords currently in <span style="font-weight:700;">use in your Active Directory</span><br></span></span></span></li><li><span style="color:inherit;"><span style="font-weight:700;">Reports on the accounts affected</span> and does not show/report on actual passwords</span><br></li><li><span style="color:inherit;"><span style="color:inherit;">Just download the install, run it, <span style="font-weight:700;">get results in minutes!</span><br></span></span></li></span></ul><ul></ul></div>
</div></div></div></div><div data-element-id="elm_zCWjvOYdEORUw4a2JjUrOQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_zCWjvOYdEORUw4a2JjUrOQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div><span style="font-weight:700;font-size:20px;">Identify how many users take the bait and reply before the bad guys do!&nbsp;</span></div></div></div>
</div><div data-element-id="elm_1Tjje77LSniwbHrc470QJg" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_1Tjje77LSniwbHrc470QJg"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-left "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-lg zpbutton-style-oval " href="https://info.knowbe4.com/password-exposure-test-partner?partnerid=0010c00001ywD8SAAU" target="_blank"><span class="zpbutton-content">Try It Now!</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Fri, 10 Jun 2022 11:13:34 +0000</pubDate></item><item><title><![CDATA[In Order to Have Good Security Culture, Behaviour Comes First]]></title><link>https://www.actisofttechnology.com/blogs/post/in-order-to-have-good-security-culture-behaviour-comes-first</link><description><![CDATA[<img align="left" hspace="5" src="https://www.actisofttechnology.com/Images/Small/iStock-668224090s.jpg"/>Blog courtesy of KnowBe4 Written by Javvid Malik In our efforts to raise awareness among users of the importance of cybersecurity and the part they have ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_q9Zjddl-TNe5PvSMvevRBg" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_6C67cXZNSbCWEWLAN5_R2w" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm__WDB6E18T6Gup6TVQCKUbg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_tLy_Dq63O9vnRYHXd0zM-Q" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_tLy_Dq63O9vnRYHXd0zM-Q"].zpelem-text { border-radius:1px; margin-block-start:-11px; } </style><div class="zptext zptext-align-left " data-editor="true"><div><div><span style="font-size:14px;">Blog courtesy of KnowBe4</span></div><p><span style="font-size:14px;">Written by Javvid Malik</span><br></p></div></div>
</div><div data-element-id="elm_FqrSq-yURERBUyK5ms0HJQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_FqrSq-yURERBUyK5ms0HJQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div>In our efforts to raise awareness among users of the importance of cybersecurity and the part they have to play in it, we sometimes go about things in a long-winded manner.</div><br><div>Many times, organisations spend a long time trying to convince people why they should take security seriously. They will come up with elaborate explanations as to why reusing passwords is a bad idea, or how the Wi-Fi in their favourite coffee shop could lead to their demise, or how minting NFTs will cause the world economy to collapse.&nbsp;</div><div><span style="color:inherit;"><br></span></div><div><span style="color:inherit;">This does work in many cases. You inform someone of the underlying reasons and the broad impact of their actions &gt; they understand and change their behaviours accordingly &gt; this leads to better security and everyone lives happily ever after.&nbsp;</span><br></div><div><span style="color:inherit;">But this approach does not work on everyone, and is not the most effective in all scenarios.&nbsp;</span></div><div><div style="color:inherit;"><div><br></div><div>So what do we do?</div><div><br></div><div>We start with the behaviour.&nbsp;</div></div></div></div></div>
</div><div data-element-id="elm_587LSM45PCdEV26d7WbSAg" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_587LSM45PCdEV26d7WbSAg"].zprow{ border-radius:1px; } </style><div data-element-id="elm_Yf3quOfsTxM19wwGuLoiXA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-8 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_Yf3quOfsTxM19wwGuLoiXA"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_F6S8kRC9Os-myOnX_swuZQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_F6S8kRC9Os-myOnX_swuZQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div><span style="color:inherit;">Consider the introduction of recycling bins. Yes, they are for the good of the environment, to prevent the ice caps from melting and to save polar bears. But is that what everyone is thinking about when they sort out their rubbish? In many cases, that is not the case. The fact that packaging usually mentions whether it can be recycled, and the provision of recycling bins next to general waste bins, makes it an easy and almost seamless behaviour to adopt.&nbsp;</span><br></div><div><br></div><div>Some people may not even be aware that recycling can potentially benefit the environment. But they will justify their doing so in their minds.&nbsp;</div><div><br></div><div>Give people a reason and they may not supply the behaviour. But give people a behaviour, and they will have no problem supplying the reasons themselves.</div><div><br></div><div>This is where building a strong security culture within an organisation can have massive benefits, like when people observe most of their colleagues behaving in a certain way. For example, they see everyone wearing their pass at all times and locking their workstations when away from it – they will adopt those behaviours too.&nbsp;</div><div><br></div><div>Will they understand all of the reasons? Probably not. But as long as they adopt the right behaviours, that goes a long way in reducing risk, which is ultimately what we want.&nbsp;</div><div><br></div><div>Behaviour comes first – attitude changes to keep up.<br></div></div></div></div></div>
</div></div></div></div><div data-element-id="elm_LiVheRlYJi4oUfD4wnsEjQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_LiVheRlYJi4oUfD4wnsEjQ"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_8NlPoQtTt8dp6IqB7SGe_Q" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_8NlPoQtTt8dp6IqB7SGe_Q"] .zpimage-container figure img { width: 300px !important ; height: 600px !important ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_8NlPoQtTt8dp6IqB7SGe_Q"] .zpimage-container figure img { width:300px ; height:600px ; } } @media (max-width: 767px) { [data-element-id="elm_8NlPoQtTt8dp6IqB7SGe_Q"] .zpimage-container figure img { width:300px ; height:600px ; } } [data-element-id="elm_8NlPoQtTt8dp6IqB7SGe_Q"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="size-original" data-size-mobile="size-original" data-align="center" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimage-container zpimage-align-center zpimage-size-original zpimage-tablet-fallback-original zpimage-mobile-fallback-original "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="https://info.knowbe4.com/demo_kcm_partner?partnerid=0010c00001ywD8SAAU" target="_blank" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Images/Other/KCM_Demo.jpg" width="300" height="600" loading="lazy" size="original"/></picture></a></figure></div>
</div></div></div><div data-element-id="elm_j1GPNhCyG2T9p4uNG17NLQ" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_j1GPNhCyG2T9p4uNG17NLQ"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-center " data-editor="true"><span style="color:inherit;font-weight:700;">How Security Culture Invokes Secure Behaviour</span><br></h2></div>
<div data-element-id="elm_jn_Bv_RZV2kptnSAWJFZQw" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> @media (min-width: 992px) { [data-element-id="elm_jn_Bv_RZV2kptnSAWJFZQw"] .zpimagetext-container figure img { width: 321px !important ; height: 415px !important ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_jn_Bv_RZV2kptnSAWJFZQw"] .zpimagetext-container figure img { width:321px ; height:415px ; } } @media (max-width: 767px) { [data-element-id="elm_jn_Bv_RZV2kptnSAWJFZQw"] .zpimagetext-container figure img { width:321px ; height:415px ; } } [data-element-id="elm_jn_Bv_RZV2kptnSAWJFZQw"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="size-original" data-size-mobile="size-original" data-align="right" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimagetext-container zpimage-with-text-container zpimage-align-right zpimage-size-original zpimage-tablet-fallback-original zpimage-mobile-fallback-original "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="https://forms.zohopublic.eu/actisofttechnologycom/form/HowSecurityCultureInvokesSecureBehaviourWhitepaper/formperma/fT7hgxiaHWw8E_TKgve6ckPsAa99r2i2fyhOPv_HBOs" target="_blank" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Images/Other/WP%20How.png" width="321" height="415" loading="lazy" size="original" data-lightbox="false"/></picture></a></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><div style="color:inherit;"><div><span style="color:inherit;">In this ground-breaking new research, KnowBe4 has been able to validate the link between security culture and secure behaviour. Though it has been suspected that the two are intertwined, until now, it has never been proven with data. Improving one's security culture directly translates into more secure employee behaviours and to the overall reduction of organisational risk.&nbsp;</span><br></div><div><span style="color:inherit;"><br></span></div><div>In this whitepaper, you'll learn how to impact secure behaviour through:</div><div><ul><ul><li><span style="color:inherit;">Intentional focus on the organization’s security culture</span></li><li>Shared ideas, customs and social behaviours</li><li>Internalising an individual's responsibilities to protect and defend</li><li>Security readiness and the effectiveness of the human layer.</li></ul></ul></div></div></div>
</div></div><div data-element-id="elm_lakf-woJRpOS3VFy2y1mcg" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_lakf-woJRpOS3VFy2y1mcg"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-left "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-lg zpbutton-style-oval " href="https://forms.zohopublic.eu/actisofttechnologycom/form/HowSecurityCultureInvokesSecureBehaviourWhitepaper/formperma/fT7hgxiaHWw8E_TKgve6ckPsAa99r2i2fyhOPv_HBOs" target="_blank"><span class="zpbutton-content">Get the Report</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Fri, 21 Jan 2022 15:54:04 +0000</pubDate></item><item><title><![CDATA[Hive Ransomware-as-a-Service Races to the Top as Affiliates Breach 350 Organisations in Just 4 Months]]></title><link>https://www.actisofttechnology.com/blogs/post/hive-ransomware-as-a-service-races-to-the-top-as-affiliates-breach-350-organiations-in-just-4-months</link><description><![CDATA[<img align="left" hspace="5" src="https://www.actisofttechnology.com/Images/Small/iStock-1277291171.jpg"/>Blog courtesy of KnowBe4 Written by Stu Sjouwerman A mere blip on the ransomware radar a quarter ago, the massive onslaught of attacks using Hive Ransom ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_q9Zjddl-TNe5PvSMvevRBg" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_6C67cXZNSbCWEWLAN5_R2w" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm__WDB6E18T6Gup6TVQCKUbg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_tLy_Dq63O9vnRYHXd0zM-Q" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_tLy_Dq63O9vnRYHXd0zM-Q"].zpelem-text { border-radius:1px; margin-block-start:-11px; } </style><div class="zptext zptext-align-left " data-editor="true"><div><div><span style="font-size:14px;">Blog courtesy of KnowBe4</span></div><p><span style="font-size:14px;">Written by Stu Sjouwerman</span><br></p></div></div>
</div><div data-element-id="elm_3mjB-29c7RdhmDcheD_hTA" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> @media (min-width: 992px) { [data-element-id="elm_3mjB-29c7RdhmDcheD_hTA"] .zpimagetext-container figure img { width: 500px ; height: 381.09px ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_3mjB-29c7RdhmDcheD_hTA"] .zpimagetext-container figure img { width:500px ; height:381.09px ; } } @media (max-width: 767px) { [data-element-id="elm_3mjB-29c7RdhmDcheD_hTA"] .zpimagetext-container figure img { width:500px ; height:381.09px ; } } [data-element-id="elm_3mjB-29c7RdhmDcheD_hTA"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="size-original" data-size-mobile="size-original" data-align="right" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimagetext-container zpimage-with-text-container zpimage-align-right zpimage-size-medium zpimage-tablet-fallback-medium zpimage-mobile-fallback-medium hb-lightbox " data-lightbox-options="
            type:fullscreen,
            theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Images/Small/iStock-475412566s.jpg" width="500" height="381.09" loading="lazy" size="medium" data-lightbox="true"/></picture></span></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div><div>A mere blip on the <a href="/ransomware" title="ransomware" target="_blank" rel="">ransomware</a> radar a quarter ago, the massive onslaught of attacks using Hive Ransomware demonstrates how dangerous the “as-a-Service” model really is.</div></div><br><div><div>If you looked at the industry data a quarter ago, <a href="https://www.coveware.com/blog/2021/10/20/ransomware-attacks-continue-as-pressure-mounts" target="_blank" rel="">Hive ransomware only represented 2.5% of all attacks.</a> But this up-and-coming new ransomware variant is a blueprint of just how easy it can be for affiliates to setup shop, download the ransomware, and collect on their bounty.</div></div><div><br></div><div><div><span style="color:inherit;">According to a <a href="https://blog.group-ib.com/hive" title="recent look into the Hive by security researchers at GroupIB" target="_blank" rel="">recent look into the Hive by security researchers at GroupIB</a>, the Hive is making ransomware easy. Affiliates can generate a unique version of the ransomware in less than 15 minutes, victim companies can be registered into the Hive’s backend (much like a software partner registering a customer in a partner portal to ensure the deal is attributed to the partner), and transparency is key; with the Hive making sure all communications with victims also visible to affiliates.</span><br></div></div></div></div></div></div></div>
</div></div><div data-element-id="elm_uS2pTncxBVLOLfnKTIcwiA" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_uS2pTncxBVLOLfnKTIcwiA"] .zpimage-container figure img { width: 1070px ; height: 612.32px ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_uS2pTncxBVLOLfnKTIcwiA"] .zpimage-container figure img { width:723px ; height:413.75px ; } } @media (max-width: 767px) { [data-element-id="elm_uS2pTncxBVLOLfnKTIcwiA"] .zpimage-container figure img { width:415px ; height:237.49px ; } } [data-element-id="elm_uS2pTncxBVLOLfnKTIcwiA"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Images/Other/Hive.png" width="415" height="237.49" loading="lazy" size="fit" data-lightbox="true"/></picture></span></figure></div>
</div><div data-element-id="elm_AGdss2kQwErCukgc9heLgw" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_AGdss2kQwErCukgc9heLgw"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p><span style="color:inherit;font-size:12px;">Source: The Hive Affiliate Program home page</span><br></p></div>
</div><div data-element-id="elm_587LSM45PCdEV26d7WbSAg" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_587LSM45PCdEV26d7WbSAg"].zprow{ border-radius:1px; } </style><div data-element-id="elm_Yf3quOfsTxM19wwGuLoiXA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-8 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_Yf3quOfsTxM19wwGuLoiXA"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_F6S8kRC9Os-myOnX_swuZQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_F6S8kRC9Os-myOnX_swuZQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div><div style="color:inherit;"><div style="color:inherit;"><div>This is a well-oiled machine. And that’s scary.</div><div><span style="color:inherit;"><br></span></div><div><span style="color:inherit;">Hive is responsible for the single largest ransom demand to date - $240 Million – made in November of last year to electronics retail giant MediaMarkt. This should tell you that the Hive is only going to grow its’ operations and be a formidable tool in the belt of affiliate cybercriminals.</span><br></div><div><br></div><div><div>The good news is Hive attacks traditionally use spear-phishing attacks as their initial attack vector. This means that effective <a href="/security-awareness-training" title="Security Awareness Training" target="_blank" rel="">Security Awareness Training</a> can do a lot to thwart phishing attacks that use social engineering tactics to trick victims into engaging with malicious loaders that will, inevitably release the Hive.</div></div><div><br></div><div>Be on the watch for this one… it’s going to sting.<br></div></div></div></div>
</div></div></div></div><div data-element-id="elm_LiVheRlYJi4oUfD4wnsEjQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_LiVheRlYJi4oUfD4wnsEjQ"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_8NlPoQtTt8dp6IqB7SGe_Q" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_8NlPoQtTt8dp6IqB7SGe_Q"] .zpimage-container figure img { width: 300px !important ; height: 600px !important ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_8NlPoQtTt8dp6IqB7SGe_Q"] .zpimage-container figure img { width:300px ; height:600px ; } } @media (max-width: 767px) { [data-element-id="elm_8NlPoQtTt8dp6IqB7SGe_Q"] .zpimage-container figure img { width:300px ; height:600px ; } } [data-element-id="elm_8NlPoQtTt8dp6IqB7SGe_Q"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="size-original" data-size-mobile="size-original" data-align="center" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimage-container zpimage-align-center zpimage-size-original zpimage-tablet-fallback-original zpimage-mobile-fallback-original "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="https://info.knowbe4.com/demo_kcm_partner?partnerid=0010c00001ywD8SAAU" target="_blank" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Images/Other/KCM_Demo.jpg" width="300" height="600" loading="lazy" size="original"/></picture></a></figure></div>
</div></div></div><div data-element-id="elm_j1GPNhCyG2T9p4uNG17NLQ" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_j1GPNhCyG2T9p4uNG17NLQ"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-center " data-editor="true">Free <span style="font-weight:700;">Ransomware Simulator Tool</span></h2></div>
<div data-element-id="elm_-2vkxbLxB2YzRFBtSWUGUw" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_-2vkxbLxB2YzRFBtSWUGUw"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div>Threat actors are constantly coming out with new strains to evade detection. Is your network effective in blocking all of them when employees fall for social engineering attacks?</div><p><br></p><div>KnowBe4’s &quot;RanSim&quot; gives you a quick look at the effectiveness of your existing network protection. RanSim will simulate 22 ransomware infection scenarios and 1 cryptomining infection scenario and show you if a workstation is vulnerable.</div></div>
</div><div data-element-id="elm_jn_Bv_RZV2kptnSAWJFZQw" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> @media (min-width: 992px) { [data-element-id="elm_jn_Bv_RZV2kptnSAWJFZQw"] .zpimagetext-container figure img { width: 500px ; height: 424.00px ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_jn_Bv_RZV2kptnSAWJFZQw"] .zpimagetext-container figure img { width:500px ; height:424.00px ; } } @media (max-width: 767px) { [data-element-id="elm_jn_Bv_RZV2kptnSAWJFZQw"] .zpimagetext-container figure img { width:500px ; height:424.00px ; } } [data-element-id="elm_jn_Bv_RZV2kptnSAWJFZQw"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="size-original" data-size-mobile="size-original" data-align="right" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimagetext-container zpimage-with-text-container zpimage-align-right zpimage-size-medium zpimage-tablet-fallback-medium zpimage-mobile-fallback-medium "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="https://info.knowbe4.com/ransomware-simulator-tool-partner?partnerid=0010c00001ywD8SAAU" target="_blank" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Images/Other/RanSim1.png" width="500" height="424.00" loading="lazy" size="medium" data-lightbox="false" style="width:500px !important;"/></picture></a></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><div>Here's how it works:</div><p><span style="color:inherit;"><br></span></p><div><ul><ul><li>100% harmless simulation of real ransomware and cryptomining infections</li><li>Does not use any of your own files</li><li>Tests 21 types of infection scenarios</li><li>Just download the install and run it&nbsp;</li><li>Results in a few minutes!</li></ul></ul></div></div>
</div></div><div data-element-id="elm_lakf-woJRpOS3VFy2y1mcg" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_lakf-woJRpOS3VFy2y1mcg"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-left "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-lg zpbutton-style-oval " href="https://info.knowbe4.com/ransomware-simulator-tool-partner?partnerid=0010c00001ywD8SAAU" target="_blank"><span class="zpbutton-content">Get RanSim!</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Tue, 11 Jan 2022 15:46:20 +0000</pubDate></item><item><title><![CDATA[How to Run a Successful Security Awareness Training Program]]></title><link>https://www.actisofttechnology.com/blogs/post/how-to-run-a-successful-security-awareness-training-program</link><description><![CDATA[<img align="left" hspace="5" src="https://www.actisofttechnology.comhttps://images.unsplash.com/photo-1551892589-865f69869476?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=Mnw0NTc5N3wwfDF8c2VhcmNofDV8fHN1Y2Nlc3N8ZW58MHx8fHwxNjMzMTAxNzk4&amp;ixlib=rb-1.2.1&amp;q=80&amp;w=1080"/>Blog courtesy of KnowBe4 Written by Stu Sjouwerman As we're now in Cybersecurity Awareness Month, thinking about how to strengthen your security awarene ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_q9Zjddl-TNe5PvSMvevRBg" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_6C67cXZNSbCWEWLAN5_R2w" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm__WDB6E18T6Gup6TVQCKUbg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_tLy_Dq63O9vnRYHXd0zM-Q" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_tLy_Dq63O9vnRYHXd0zM-Q"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div><div><span style="font-size:14px;">Blog courtesy of KnowBe4</span></div><p><span style="font-size:14px;">Written by Stu Sjouwerman</span><br></p></div></div>
</div><div data-element-id="elm_lpqQgyRkuRV_0HPMTdSINw" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_lpqQgyRkuRV_0HPMTdSINw"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div>As we're now in Cybersecurity Awareness Month, thinking about how to strengthen your security awareness training program is probably top of mind.</div><div><br></div><div><div>Luckily, we've got you covered with helpful tips you can use to run a strong <a href="/security-awareness-training" title="security awareness training" target="_blank" rel="">security awareness training</a> program in your organisation! We asked our Security Awareness Advocates for their expert advice on questions like how to get started, how to motivate your users, and how to develop a strong security culture over time. While not an exhaustive list, here is a handy one-sheet with what they had to say:</div></div></div></div>
</div><div data-element-id="elm_587LSM45PCdEV26d7WbSAg" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_587LSM45PCdEV26d7WbSAg"].zprow{ border-radius:1px; } </style><div data-element-id="elm_Yf3quOfsTxM19wwGuLoiXA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-8 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_Yf3quOfsTxM19wwGuLoiXA"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_zrlU52YkTRkQhP4BSNauxw" data-element-type="image" class="zpelement zpelem-image "><style> [data-element-id="elm_zrlU52YkTRkQhP4BSNauxw"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="size-original" data-size-mobile="size-original" data-align="center" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimage-container zpimage-align-center zpimage-size-original zpimage-tablet-fallback-original zpimage-mobile-fallback-original "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="/files/Successful%20Security%20Awareness%20Training%20Program.jpg" target="_blank" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Images/Other/Successful%20Security%20Awareness%20Training%20Program.jpg" size="original"/></picture></a></figure></div>
</div><div data-element-id="elm_3zZJSo2Y2wBtTkrKEDmqlg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_3zZJSo2Y2wBtTkrKEDmqlg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p><span style="font-style:italic;">Click <a href="/files/Successful%20Security%20Awareness%20Training%20Program.jpg" target="_blank" rel="">here</a> to download the full infographic</span></p></div>
</div></div><div data-element-id="elm_LiVheRlYJi4oUfD4wnsEjQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_LiVheRlYJi4oUfD4wnsEjQ"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_8NlPoQtTt8dp6IqB7SGe_Q" data-element-type="image" class="zpelement zpelem-image "><style> [data-element-id="elm_8NlPoQtTt8dp6IqB7SGe_Q"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="size-original" data-size-mobile="size-original" data-align="center" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimage-container zpimage-align-center zpimage-size-original zpimage-tablet-fallback-original zpimage-mobile-fallback-original "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="https://info.knowbe4.com/demo_kcm_partner?partnerid=0010c00001ywD8SAAU" target="_blank" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Images/Other/KCM_Demo.jpg" size="original"/></picture></a></figure></div>
</div></div></div><div data-element-id="elm_JA7v4ZVdMgAguRdsoSwneQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_JA7v4ZVdMgAguRdsoSwneQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div><span style="font-weight:700;">Critical components of a successful security awareness program:</span></div>
<div><ul><ul><li>Use good, high quality content that’s highly relevant to your users</li><li>Reinforce the training with regular simulated phishing attacks</li><li>Stay current with what is happening in real phishing attacks - mirror the topics and methods used by cybercriminals</li></ul></ul></div>
<div><span style="font-weight:700;">How to motivate your users to do their training on time:</span></div>
<div><ul><ul><li>Lead with a carrot, not a stick! Reward users upon completion (could be a sticker, certificate, raffling off a gift card, etc.)</li><li>Make it a game and create healthy competition between departments or other groups</li><li>Get your leadership involved publicly - make sure it’s well known and seen. It will make the rest of the organisation want to follow in their footsteps</li></ul></ul></div>
<div><span style="font-weight:700;">How to gain and maintain executive support for your security awareness program:</span></div>
<div><ul><ul><li>Speak their language: Don’t get too technical, and tie it to business objectives (risk, reputation, business benefits, profit and loss impact, etc.)</li><li>Address the “why” and how does it help your organisation be more successful</li><li>Talk about cybersecurity in the news, how it was a result of human error, and how this program will help to mitigate human error</li></ul></ul></div>
<div><span style="font-weight:700;">How to measure the benefits of a successful security awareness program:</span></div>
<div><ul><ul><li>Track metrics like the phish-prone percentage of your organisation or number of phishing emails reported over time</li><li>Conduct surveys with different stakeholders to gauge their perception of the program’s success</li><li>Whatever you use to measure success, make sure it is defined, agreed upon and tracked</li></ul></ul></div>
<div><span style="font-weight:700;">How to develop a stronger security awareness culture over time:</span></div>
<div><ul><ul><li>Evaluate your organisation against the <a href="https://forms.zohopublic.eu/actisofttechnologycom/form/SecurityCultureReport2021/formperma/0VnPhieKikRwF3X5v74SOS9mozTV8ROGkMdWrEGTb2E" title="7 dimensions of security culture" target="_blank" rel="">7 dimensions of security culture</a>, and measure it against your industry’s benchmarks (we have done studies on this!)<br></li><li>Tie your security culture into your overall organisational culture so the two are not at odds</li><li>Understand that there is no fast track to a good security culture - by consistently following the advice above, you will develop a strong security awareness culture over time</li></ul></ul></div>
<div><div>We hope these tips can help you implement new-school security awareness training for your users. Here are <a href="https://support.knowbe4.com/hc/en-us/articles/4406863822483-How-to-Develop-a-Successful-Security-Awareness-Program" title="more in-depth videos" target="_blank" rel="">more in-depth videos</a> on our partner support site. Make sure you're prepared for Cybersecurity Awareness Month and beyond!&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;&nbsp;</div></div>
</div></div></div></div></div></div></div></div><div data-element-id="elm_j1GPNhCyG2T9p4uNG17NLQ" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_j1GPNhCyG2T9p4uNG17NLQ"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-center " data-editor="true"><span style="color:inherit;">Get Your Free <span style="font-weight:700;">2021 Cybersecurity Awareness Month Resource Kit</span></span><br></h2></div>
<div data-element-id="elm_-2vkxbLxB2YzRFBtSWUGUw" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_-2vkxbLxB2YzRFBtSWUGUw"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div>In today's hybrid work environment, your users are more susceptible than ever to attacks like phishing and social engineering. Cybercriminals know this and are constantly changing tactics to exploit new vulnerabilities. We've put together these resources so you can keep your users on their toes with security top of mind. Request your kit now to help your users defend against cybercrime whether they are fully remote, back in the office, or a combination of both.</div></div></div>
</div><div data-element-id="elm_jn_Bv_RZV2kptnSAWJFZQw" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> [data-element-id="elm_jn_Bv_RZV2kptnSAWJFZQw"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="size-original" data-size-mobile="size-original" data-align="right" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimagetext-container zpimage-with-text-container zpimage-align-right zpimage-size-medium zpimage-tablet-fallback-medium zpimage-mobile-fallback-medium "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="https://info.knowbe4.com/cybersecurity-awareness-month-resource-kit-partner?partnerid=0010c00001ywD8SAAU" target="_blank" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Images/Other/CS%20Awareness%20Month.png" size="medium" data-lightbox="false" style="width:624px;"/></picture></a></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><div><span style="color:inherit;font-weight:700;">Here's what you'll get:</span></div><div><span style="color:inherit;font-weight:700;"><div style="color:inherit;"><ul><li><span style="font-weight:400;">Access to&nbsp;<strong>free resources for you</strong>&nbsp;including our most popular on-demand webinar and whitepaper</span></li><li><span style="font-weight:400;">Resources to help you plan your activities, including your&nbsp;<strong>Cybersecurity Awareness Month Guide&nbsp;</strong>and&nbsp;<strong>Cybersecurity Awareness Weekly Planner<br></strong></span></li><li><span style="font-weight:400;">Two free&nbsp;training modules for your users;&nbsp;<strong>&quot;Your Role: Internet Security and You</strong><strong>&quot;</strong>&nbsp;and&nbsp;<strong>&quot;2021 Social Engineering Red Flags,&quot;&nbsp;</strong>both available in multiple&nbsp;languages</span></li><li><strong><span style="font-weight:400;">Resources to share with your users</span></strong><span style="font-weight:400;">&nbsp;including Kevin Mitnick cybersecurity demo videos, infographics, tip sheets, awareness posters, and wallpapers</span></li><li><strong><span style="font-weight:400;">All assets are printable and available digitally</span></strong><span style="font-weight:400;">, so they can be delivered to your users no matter where they are working from&nbsp;</span></li></ul></div></span></div></div>
</div></div><div data-element-id="elm_lakf-woJRpOS3VFy2y1mcg" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_lakf-woJRpOS3VFy2y1mcg"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-left "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-lg zpbutton-style-oval " href="https://info.knowbe4.com/cybersecurity-awareness-month-resource-kit-partner?partnerid=0010c00001ywD8SAAU" target="_blank"><span class="zpbutton-content">Get Your Free Resource Kit Now!</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Fri, 01 Oct 2021 15:18:27 +0000</pubDate></item><item><title><![CDATA[Probability of Experiencing a Vendor Email Compromise Attack Increases 96%]]></title><link>https://www.actisofttechnology.com/blogs/post/probability-of-experiencing-a-vendor-email-compromise-attack-increases-96</link><description><![CDATA[<img align="left" hspace="5" src="https://www.actisofttechnology.com/Images/Small/iStock-836453798.jpg"/>Blog courtesy of KnowBe4 Written by Stu Sjouwerman Vendor Email Compromise requires first taking control of a strategic email account within the victim ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_K181GJulRSeMPB2AjTWqEQ" data-element-type="section" class="zpsection "><style type="text/css"> [data-element-id="elm_K181GJulRSeMPB2AjTWqEQ"].zpsection{ border-radius:1px; } </style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_dH7_4A98TlGro0W6gYV1_Q" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_sWFAZGeUSj-cOjCo3l4yQg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_6SOucho61sNVozqQ9bxmug" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_6SOucho61sNVozqQ9bxmug"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div><span style="font-size:14px;">Blog courtesy of KnowBe4</span></div><div><span style="font-size:14px;">Written by Stu Sjouwerman</span></div></div>
</div><div data-element-id="elm_d_G0oN8UqZlyifTibcx0gw" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> [data-element-id="elm_d_G0oN8UqZlyifTibcx0gw"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="size-original" data-size-mobile="size-original" data-align="right" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimagetext-container zpimage-with-text-container zpimage-align-right zpimage-size-medium zpimage-tablet-fallback-medium zpimage-mobile-fallback-medium "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="https://info.knowbe4.com/one-on-one-demo-partners?partnerid=0010c00001ywD8SAAU" target="_blank" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/images/gef1f31aa752d3f1b4d534618bb365488fd303e7bacd59e35b9c6c9bd4c6307b965f927709fff7cd8b2961df9560b1789a4f8e3226bba916b49b091519d0fc506_1280.png" size="medium" data-lightbox="false" style="width:1280px;padding:0px;margin:0px;"/></picture></a></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><div style="color:inherit;"><div style="color:inherit;"><div><div><a href="/kcm-grc-vendor-risk" title="Vendor Email Compromise" target="_blank" rel="">Vendor Email Compromise</a> requires first taking control of a strategic email account within the victim organisations. According to new data, cybercriminals are getting really good at this.</div></div><div><br></div><div>Vendor Email Compromise – an attack where an email account is actually taken over rather than simply spoofed as seen in business email compromise attacks – can have a far greater impact on the organisation. Emails coming from a threat actor-controlled legitimate email account are much harder – if not impossible – to discern as being malicious in nature.</div></div></div></div>
</div></div><div data-element-id="elm_W5u15X0ZUSqQyfdx4NKi4Q" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> [data-element-id="elm_W5u15X0ZUSqQyfdx4NKi4Q"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="size-original" data-size-mobile="size-original" data-align="right" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimagetext-container zpimage-with-text-container zpimage-align-right zpimage-size-original zpimage-tablet-fallback-original zpimage-mobile-fallback-original "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="https://www.knowbe4events.com/kb4-con-emea?promo=0010c00001ywD8SAAU&amp;tr=true" target="_blank" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Images/Other/KB4-CON.png" size="original" data-lightbox="false"/></picture></a></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><div style="color:inherit;"><div style="color:inherit;"><div><div>According to new data in Abnormal Security’s <a href="https://info.abnormalsecurity.com/threat-report-2021-q3.html" title="Q3 2021 Email Threat Report," target="_blank" rel="">Q3 2021 Email Threat Report,</a> email account takeovers are rising in both number and success rates:</div></div><div><ul><ul><li>The chance of experiencing a VEC attack has risen 96% over the last 12 months</li><li>Mid-sized companies are 43% likely to have at least one account takeover per quarter</li><li>Enterprises with 50K+ employees are 60% likely to be a victim of account takeover</li><li>The C-Suite is the most targeted group, at three times than VPs – the next targeted group</li><li>14% of account takeovers occur at department head levels within organizations</li><li>The average request in a VEC attack is $183,000, with the highest documented being $1.6 million</li></ul></ul></div><br><div><div>With the potential for VEC attacks to cost organisation’s millions annually, it’s first imperative to protect email accounts from the possibility of account takeover using multi-factor authentication and zero trust solutions that scrutinise requests to access email. It’s equally important to educate users involved with the organisation’s finances using <a href="/security-awareness-training" title="Security Awareness Training" target="_blank" rel="">Security Awareness Training</a> to maintain a sense of vigilance – even when a request comes from a legitimate source. It’s necessary to validate any unexpected requests using a separate communication medium to ensure the person believed to be asking is actually doing so.</div></div></div></div></div>
</div></div><div data-element-id="elm_vd_QDyLo9HvDhJ7o2WxobQ" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_vd_QDyLo9HvDhJ7o2WxobQ"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-center " data-editor="true">Request A Demo: KCM GRC</h2></div>
<div data-element-id="elm_MaW2PHPS0buy854OEBJgrQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_MaW2PHPS0buy854OEBJgrQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div>The new KCM GRC platform helps you get your audits done in half the time, is easy to use, and is surprisingly affordable. No more: &quot;UGH, is it that time again!&quot;&nbsp;</div></div></div>
</div><div data-element-id="elm_mdfoo19qzmlQXJLtBHEKZg" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> [data-element-id="elm_mdfoo19qzmlQXJLtBHEKZg"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="size-original" data-size-mobile="size-original" data-align="right" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimagetext-container zpimage-with-text-container zpimage-align-right zpimage-size-medium zpimage-tablet-fallback-medium zpimage-mobile-fallback-medium "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="https://info.knowbe4.com/one-on-one-demo-partners?partnerid=0010c00001ywD8SAAU" target="_blank" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Images/Other/products-KCM2-3.png" size="medium" data-lightbox="false" style="width:800px;"/></picture></a></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><div style="color:inherit;"><div>With KCM GRC you can:</div><div><ul><ul><li>Reduce the amount of time and money required to easily manage your compliance, risk and audit requirements</li><li>Automate reminders so you can quickly see what tasks have been completed, not met, and are past due</li><li>Simplify risk management with an intuitive interface simple workflow based on NIST 800-30.</li><li>Efficiently manage your third-party vendor risk requirements</li><li>Quickly implement compliance and risk assessment processes using KnowBe4's pre-built requirements and assessment templates</li></ul></ul></div></div></div>
</div></div><div data-element-id="elm_m5bg7tahQfKJKJ_xSqhWIA" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_m5bg7tahQfKJKJ_xSqhWIA"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-left "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-lg zpbutton-style-oval " href="https://info.knowbe4.com/demo_kcm_partner?partnerid=0010c00001ywD8SAAU" target="_blank"><span class="zpbutton-content">Request Your Demo!</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Mon, 20 Sep 2021 14:51:00 +0000</pubDate></item><item><title><![CDATA[Enterprise Organisations Have as Much as an 85% Chance of Receiving a BEC Attack Every Week]]></title><link>https://www.actisofttechnology.com/blogs/post/enterprise-organizations-have-as-much-as-an-85-chance-of-receiving-a-bec-attack-every-week</link><description><![CDATA[<img align="left" hspace="5" src="https://www.actisofttechnology.com/Images/Small/iStock-954712690.jpg"/>Blog courtesy of KnowBe4 Written by Stu Sjouwerman Business Email Compromise is a multi-billion dollar business, representing 43% of all cybercrime last ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_q9Zjddl-TNe5PvSMvevRBg" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_6C67cXZNSbCWEWLAN5_R2w" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm__WDB6E18T6Gup6TVQCKUbg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_tLy_Dq63O9vnRYHXd0zM-Q" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_tLy_Dq63O9vnRYHXd0zM-Q"].zpelem-text { border-radius:1px; margin-block-start:-14px; } </style><div class="zptext zptext-align-left " data-editor="true"><div><div><span style="font-size:14px;">Blog courtesy of KnowBe4</span></div><p><span style="font-size:14px;">Written by Stu Sjouwerman</span><br></p></div></div>
</div><div data-element-id="elm_3mjB-29c7RdhmDcheD_hTA" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> [data-element-id="elm_3mjB-29c7RdhmDcheD_hTA"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="size-original" data-size-mobile="size-original" data-align="right" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimagetext-container zpimage-with-text-container zpimage-align-right zpimage-size-medium zpimage-tablet-fallback-medium zpimage-mobile-fallback-medium hb-lightbox " data-lightbox-options="
            type:fullscreen,
            theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Images/Small/iStock-533992794.jpg" size="medium" data-lightbox="true" style="width:591px;"/></picture></span></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div>Business Email Compromise is a multi-billion dollar business, representing 43% of all cybercrime last year. Despite it being dwarfed in the news by ransomware, it represents a growing and consistent threat.</div><div><br></div><div><div>We’ve seen recent rises in BEC activity – along with a number of other cyberattacks – in both frequency and cost. But BEC tends to get lost in the shuffle; particularly when <a href="/ransomware" title="ransomware" target="_blank" rel="">ransomware</a> news has ransoms in the millions of dollars and seems to happen every day. But BEC is just as impactful a cyberattack and, from the latest data, seems to be happening quite frequently.</div></div><div><br></div><div><span style="color:inherit;">Keep in mind that most BEC attacks are limited in scope to the one and only CFO in your organisation or a small group of individuals in the finance department. The good news is as the organisation grows, the number of BEC attacks won’t necessarily increase. The bad news is that threat actors only need to focus on a few people to be successful.</span></div></div></div></div></div>
</div></div><div data-element-id="elm_587LSM45PCdEV26d7WbSAg" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_587LSM45PCdEV26d7WbSAg"].zprow{ border-radius:1px; } </style><div data-element-id="elm_Yf3quOfsTxM19wwGuLoiXA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-8 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_Yf3quOfsTxM19wwGuLoiXA"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_F6S8kRC9Os-myOnX_swuZQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_F6S8kRC9Os-myOnX_swuZQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div><div style="color:inherit;"><div><div>In addition to enterprises having a high probability of attack, according to Abnormal Security’s <a href="https://info.abnormalsecurity.com/threat-report-2021-q3.html" title="Q3 2021 Email Threat Report" target="_blank" rel="">Q3 2021 Email Threat Report</a>, businesses of every size are at risk:</div></div><div><br></div><div><ul><ul><li>Small organisations under 500 employees have a 42% probability of receiving a BEC attack each week</li><li>Mid-sized organisations, a 60-70% chance</li></ul></ul></div><br><div><div>Part of this growth is the expansion in operational methods used by cybercriminal groups seen on the dark web. <a href="https://intel471.com/blog/bec-cybercrime-underground" title="Posts on cybercrime forums have been spotted that attempt to recruit or outsource functions related to BEC scams" target="_blank" rel="">Posts on cybercrime forums have been spotted that attempt to recruit or outsource functions related to BEC scams</a> – particularly those looking for native-English speakers to help improve the credibility and efficacy of <a href="/social-engineering" title="social engineering" target="_blank" rel="">social engineering</a> elements in BEC attacks.</div></div><br><div><div><span style="color:inherit;">Because BEC relies pretty heavily on social engineering and spoofing companies, domains, and/or an individual, putting employees through <a href="/security-awareness-training" title="Security Awareness Training" target="_blank" rel="">Security Awareness Training</a> is an effective way to minimise the threat surface of phishing attacks and stop BEC attacks before they have an opportunity to make an organisation a victim.</span><br></div></div></div></div>
</div></div></div></div><div data-element-id="elm_LiVheRlYJi4oUfD4wnsEjQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_LiVheRlYJi4oUfD4wnsEjQ"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_8NlPoQtTt8dp6IqB7SGe_Q" data-element-type="image" class="zpelement zpelem-image "><style> [data-element-id="elm_8NlPoQtTt8dp6IqB7SGe_Q"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="size-original" data-size-mobile="size-original" data-align="center" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimage-container zpimage-align-center zpimage-size-original zpimage-tablet-fallback-original zpimage-mobile-fallback-original "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="https://www.knowbe4events.com/kb4-con-emea?promo=0010c00001ywD8SAAU&amp;tr=true" target="_blank" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Images/Other/KB4-CON.png" size="original"/></picture></a></figure></div>
</div></div></div><div data-element-id="elm_j1GPNhCyG2T9p4uNG17NLQ" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_j1GPNhCyG2T9p4uNG17NLQ"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-center " data-editor="true"><span style="color:inherit;">Can hackers spoof an email address of your own domain?</span><br></h2></div>
<div data-element-id="elm_jn_Bv_RZV2kptnSAWJFZQw" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> [data-element-id="elm_jn_Bv_RZV2kptnSAWJFZQw"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="size-original" data-size-mobile="size-original" data-align="right" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimagetext-container zpimage-with-text-container zpimage-align-right zpimage-size-large zpimage-tablet-fallback-large zpimage-mobile-fallback-large "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="https://info.knowbe4.com/one-on-one-demo-partners?partnerid=0010c00001ywD8SAAU" target="_blank" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Images/Other/Spoof.png" size="large" data-lightbox="false" style="width:349px;"/></picture></a></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><div>Are you aware that one of the first things hackers try is to see if they can spoof the email address of your CEO? If they are able to commit &quot;CEO Fraud&quot;, penetrating your network is like taking candy from a baby.</div><div><br></div><div>Now they can launch a &quot;CEO fraud&quot; spear phishing attack on your organisation, and that type of attack is very hard to defend against, unless your users are highly ‘security awareness’ trained.</div><div><br></div><div>Find out now if your domain can be spoofed. The Domain Spoof Test (DST) is a one-time free service. Run this test so you can address any mail server configuration issues that are found.</div></div>
</div></div><div data-element-id="elm_lakf-woJRpOS3VFy2y1mcg" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_lakf-woJRpOS3VFy2y1mcg"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-left "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-lg zpbutton-style-oval " href="https://info.knowbe4.com/domain-spoof-test-partner?partnerid=0010c00001ywD8SAAU" target="_blank"><span class="zpbutton-content">Try To Spoof Me!</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Mon, 20 Sep 2021 08:31:00 +0000</pubDate></item><item><title><![CDATA[U.K. Organisations See Double the Number of Ransomware Attacks in the First Half of 2021]]></title><link>https://www.actisofttechnology.com/blogs/post/u.k.-organisations-see-double-the-number-of-ransomware-attacks-in-the-first-half-of-2021</link><description><![CDATA[<img align="left" hspace="5" src="https://www.actisofttechnology.com/Images/Small/iStock-475412566s.jpg"/>Blog courtesy of KnowBe4 Written by Stu Sjouwerman New analysis of ransomware incidents reported to the UK's Information Commissioner's Office (ICO) in ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_q9Zjddl-TNe5PvSMvevRBg" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_6C67cXZNSbCWEWLAN5_R2w" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm__WDB6E18T6Gup6TVQCKUbg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_tLy_Dq63O9vnRYHXd0zM-Q" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_tLy_Dq63O9vnRYHXd0zM-Q"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div><div><span style="font-size:14px;">Blog courtesy of KnowBe4</span></div><p><span style="font-size:14px;">Written by Stu Sjouwerman</span><br></p></div></div>
</div><div data-element-id="elm_3mjB-29c7RdhmDcheD_hTA" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> [data-element-id="elm_3mjB-29c7RdhmDcheD_hTA"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="size-original" data-size-mobile="size-original" data-align="right" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimagetext-container zpimage-with-text-container zpimage-align-right zpimage-size-medium zpimage-tablet-fallback-medium zpimage-mobile-fallback-medium hb-lightbox " data-lightbox-options="
            type:fullscreen,
            theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Images/Small/iStock-693352614.jpg" size="medium" data-lightbox="true" style="width:724px;"/></picture></span></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><div style="color:inherit;"><div style="color:inherit;"><div><div>New analysis of <a href="/ransomware" title="ransomware" target="_blank" rel="">ransomware</a> incidents reported to the UK's Information Commissioner's Office (ICO) in the first half of 2021 show a massive rise when compared to 2020.</div></div><div><br></div><div>Utilising incident data reported to the ICO, British cyber security organisation CybSafe has determined that 22% of all cyber incidents in the first six months of 2021 were attributed to ransomware attacks. This is double the 11% found in the first half of 2020.</div><div><br></div><div><span style="color:inherit;">This doubling of the number of reported attacks is troubling, but not surprising, as 35% of all U.K.&nbsp;</span><span style="color:inherit;">businesses experience ransomware attacks (with the global average being 37%), according to Sophos’ State of Ransomware 2021 report.&nbsp;</span><br></div></div></div></div>
</div></div><div data-element-id="elm_587LSM45PCdEV26d7WbSAg" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_587LSM45PCdEV26d7WbSAg"].zprow{ border-radius:1px; } </style><div data-element-id="elm_Yf3quOfsTxM19wwGuLoiXA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-8 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_Yf3quOfsTxM19wwGuLoiXA"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_F6S8kRC9Os-myOnX_swuZQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_F6S8kRC9Os-myOnX_swuZQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div><div><span style="color:inherit;">Additionally, 63% of U.K. businesses affected by ransomware reported their organisations' brand was negatively impacted, according to <a href="https://www.cybereason.com/hubfs/dam/collateral/ebooks/Cybereason_Ransomware_Research_2021.pdf" title="CyberReason’s Ransomware: The True Cost To Business" target="_blank" rel="">CyberReason’s Ransomware: The True Cost To Business</a> report, making ransomware a legitimate threat to business longevity in the U.K.</span><br></div></div><div><span style="color:inherit;"><br></span></div><div><div style="color:inherit;"><div>CybSafe’s analysis found that phishing was the primary cause of all cyber breaches reported to the ICO in the first half of this year, making up 40% of all successful attacks. Phishing continues to be a thorn in cybersecurity’s side, with some percentage of attacks finding their way past security solutions and into the Inbox where an unsuspecting user is fooled into clicking on malicious links and attachments.</div><br><div><div><span style="color:inherit;">It’s only through continual <a href="/security-awareness-training" title="Security Awareness Training" target="_blank" rel="">Security Awareness Training</a> that users will elevate their state of vigilance, always being on the lookout for malicious content and reducing whatever threat surface remains by the time an attack reaches the Inbox.</span><br></div></div></div></div>
</div></div></div></div><div data-element-id="elm_LiVheRlYJi4oUfD4wnsEjQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_LiVheRlYJi4oUfD4wnsEjQ"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_8NlPoQtTt8dp6IqB7SGe_Q" data-element-type="image" class="zpelement zpelem-image "><style> [data-element-id="elm_8NlPoQtTt8dp6IqB7SGe_Q"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="size-original" data-size-mobile="size-original" data-align="center" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimage-container zpimage-align-center zpimage-size-original zpimage-tablet-fallback-original zpimage-mobile-fallback-original "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="https://www.knowbe4events.com/kb4-con-emea?promo=0010c00001ywD8SAAU&amp;tr=true" target="_blank" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Images/Other/KB4-CON.png" size="original"/></picture></a></figure></div>
</div></div></div><div data-element-id="elm_j1GPNhCyG2T9p4uNG17NLQ" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_j1GPNhCyG2T9p4uNG17NLQ"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-center " data-editor="true">Free <span style="font-weight:700;">Ransomware Simulator Tool</span></h2></div>
<div data-element-id="elm_-2vkxbLxB2YzRFBtSWUGUw" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_-2vkxbLxB2YzRFBtSWUGUw"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div>Threat actors are constantly coming out with new strains to evade detection. Is your network effective in blocking all of them when employees fall for social engineering attacks?</div><p><br></p><div>KnowBe4’s &quot;RanSim&quot; gives you a quick look at the effectiveness of your existing network protection. RanSim will simulate 22 ransomware infection scenarios and 1 cryptomining infection scenario and show you if a workstation is vulnerable.</div></div>
</div><div data-element-id="elm_jn_Bv_RZV2kptnSAWJFZQw" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> [data-element-id="elm_jn_Bv_RZV2kptnSAWJFZQw"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="size-original" data-size-mobile="size-original" data-align="right" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimagetext-container zpimage-with-text-container zpimage-align-right zpimage-size-medium zpimage-tablet-fallback-medium zpimage-mobile-fallback-medium "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="https://info.knowbe4.com/one-on-one-demo-partners?partnerid=0010c00001ywD8SAAU" target="_blank" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Images/Other/RanSim1.png" size="medium" data-lightbox="false" style="width:500px;padding:0px;margin:0px;"/></picture></a></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><div>Here's how it works:</div><p><span style="color:inherit;"><br></span></p><div><ul><ul><li>100% harmless simulation of real ransomware and cryptomining infections</li><li>Does not use any of your own files</li><li>Tests 21 types of infection scenarios</li><li>Just download the install and run it&nbsp;</li><li>Results in a few minutes!</li></ul></ul></div></div>
</div></div><div data-element-id="elm_lakf-woJRpOS3VFy2y1mcg" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_lakf-woJRpOS3VFy2y1mcg"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-left "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-lg zpbutton-style-oval " href="https://info.knowbe4.com/ransomware-simulator-tool-partner?partnerid=0010c00001ywD8SAAU" target="_blank"><span class="zpbutton-content">Get RanSim!</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Tue, 31 Aug 2021 07:28:00 +0000</pubDate></item><item><title><![CDATA[Can the Microsoft 365 Platform Be Trusted to Stop Security Breaches?]]></title><link>https://www.actisofttechnology.com/blogs/post/defending-against-ransomware-attacks-should-start-and-can-end-with-security-awareness-training1</link><description><![CDATA[<img align="left" hspace="5" src="https://www.actisofttechnology.comhttps://images.unsplash.com/photo-1484069560501-87d72b0c3669?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=Mnw0NTc5N3wwfDF8c2VhcmNofDE1fHxicmVhY2h8ZW58MHx8fHwxNjI5NTU3NDA0&amp;ixlib=rb-1.2.1&amp;q=80&amp;w=1080"/>Blog courtesy of KnowBe4 Written by Stu Sjouwerman Lax security policies, a lack of security measures and solutions in place, and an expectation that Mi ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_K181GJulRSeMPB2AjTWqEQ" data-element-type="section" class="zpsection "><style type="text/css"> [data-element-id="elm_K181GJulRSeMPB2AjTWqEQ"].zpsection{ border-radius:1px; } </style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_dH7_4A98TlGro0W6gYV1_Q" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_sWFAZGeUSj-cOjCo3l4yQg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_6SOucho61sNVozqQ9bxmug" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_6SOucho61sNVozqQ9bxmug"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div><span style="font-size:14px;">Blog courtesy of KnowBe4</span></div><div><span style="font-size:14px;">Written by Stu Sjouwerman</span></div></div>
</div><div data-element-id="elm_d_G0oN8UqZlyifTibcx0gw" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> [data-element-id="elm_d_G0oN8UqZlyifTibcx0gw"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="size-original" data-size-mobile="size-original" data-align="right" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimagetext-container zpimage-with-text-container zpimage-align-right zpimage-size-medium zpimage-tablet-fallback-medium zpimage-mobile-fallback-medium "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="https://info.knowbe4.com/one-on-one-demo-partners?partnerid=0010c00001ywD8SAAU" target="_blank" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/images/g3616026baed2d5e696c8211a6db3392309930754db25cdefdddf8c7664ef69c1acb3efb2ea2e1a55fd333d91fb9a1366c12549878c619520c1ee93c44e6acd6a_1280.jpg" size="medium" data-lightbox="false" style="width:1280px;padding:0px;margin:0px;"/></picture></a></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><div style="color:inherit;"><div>Lax security policies, a lack of security measures and solutions in place, and an expectation that Microsoft will address any security issues is putting organisations at risk.</div><br><div><div>Microsoft has gone to great lengths to ensure their Microsoft 365 platform offers modern security measures to keep their customers' data safe. But according to <a href="https://www.hornetsecurity.com/en/security-information/microsoft365-email-security-survey/" title="new data from cloud email security provider Hornet Security" target="_blank" rel="">new data from cloud email security provider Hornet Security</a>, 25% of organisations have reported a known email-based security breach, and it begs the question “why?”</div></div></div></div>
</div></div><div data-element-id="elm_W5u15X0ZUSqQyfdx4NKi4Q" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> [data-element-id="elm_W5u15X0ZUSqQyfdx4NKi4Q"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="size-original" data-size-mobile="size-original" data-align="right" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimagetext-container zpimage-with-text-container zpimage-align-right zpimage-size-medium zpimage-tablet-fallback-medium zpimage-mobile-fallback-medium "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="https://info.knowbe4.com/demo_kcm_partner?partnerid=0010c00001ywD8SAAU" target="_blank" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Images/Other/KCM_Demo.jpg" size="medium" data-lightbox="false" style="width:300px;"/></picture></a></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><div style="color:inherit;"><div>According to Hornet Security, a lot of the issue resides with organisations not taking advantage of security features – whether from Microsoft or a third-party:</div><div><ul><ul><li>33% of organisations are not using Microsoft’s multi-factor authentication (MFA)</li><li>Of those using MFA, 55% of organisations are not using Conditional Access which scrutinizes connection requests beyond just providing credentials and additional authentication factors</li><li>Only 43% leverage Microsoft’s data loss prevention policies to keep data from leaving the organisation</li><li>68% of organisations expect Microsoft to keep email safe from threats</li></ul></ul></div><br><div>What’s interesting is that almost none of these features (with the exception of MFA) address the core issue – phishing and compromised credentials. For every organisation that has experienced a security breach, there’s a phishing email riddled with social engineering tactics and, more importantly, a recipient user who engages and activates attacker’s malicious content.</div><div><br></div><div><div>It’s imperative that organisations recognise the need to follow the attack kill chain and see one of the weakest links is the user who unwittingly enables threat actors by falling for phishing scams. Users that undergo continual <a href="/security-awareness-training" title="Security Awareness Training" target="_blank" rel="">Security Awareness Training</a> are better equipped on a daily basis to see phishing attacks for what they really are and keep the organization safe by not playing their role in an email-based attack.</div></div></div></div>
</div></div><div data-element-id="elm_vd_QDyLo9HvDhJ7o2WxobQ" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_vd_QDyLo9HvDhJ7o2WxobQ"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-center " data-editor="true">Request A Demo:&nbsp;<span style="font-weight:700;">Security Awareness Training</span></h2></div>
<div data-element-id="elm_mdfoo19qzmlQXJLtBHEKZg" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> [data-element-id="elm_mdfoo19qzmlQXJLtBHEKZg"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="size-original" data-size-mobile="size-original" data-align="right" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimagetext-container zpimage-with-text-container zpimage-align-right zpimage-size-original zpimage-tablet-fallback-original zpimage-mobile-fallback-original "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="https://info.knowbe4.com/one-on-one-demo-partners?partnerid=0010c00001ywD8SAAU" target="_blank" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Images/Other/SAT.png" size="original" data-lightbox="false"/></picture></a></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><p><span style="color:inherit;">New-school Security Awareness Training is critical to enabling you and your IT staff to connect with users and help them make the right security decisions all of the time. This isn't a one and done deal, continuous training and simulated phishing are both needed to mobilise users as your last line of defence. Request your one-on-one demo of KnowBe4's security awareness training and simulated phishing platform and see how easy it can be!</span><br></p></div>
</div></div><div data-element-id="elm_m5bg7tahQfKJKJ_xSqhWIA" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_m5bg7tahQfKJKJ_xSqhWIA"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-left "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-lg zpbutton-style-oval " href="https://info.knowbe4.com/one-on-one-demo-partners?partnerid=0010c00001ywD8SAAU" target="_blank"><span class="zpbutton-content">Save My Spot!</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Fri, 20 Aug 2021 13:45:50 +0000</pubDate></item><item><title><![CDATA[Defending Against Ransomware Attacks Should Start (and Can End) With Security Awareness Training]]></title><link>https://www.actisofttechnology.com/blogs/post/defending-against-ransomware-attacks-should-start-and-can-end-with-security-awareness-training</link><description><![CDATA[<img align="left" hspace="5" src="https://www.actisofttechnology.com/images/gb4e62795cd16a8439b2fc1ed82c1697a961bf84e8f9fa89dd657012e391e6aef79c1bb4ccdd1108873ac6b30fadb1ebedbef324a7b2c4c4e03b1532613015d19_1280.png"/>Blog courtesy of KnowBe4 Written by Stu Sjouwerman The world’s most dangerous, expensive, and impactful cyb ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_q9Zjddl-TNe5PvSMvevRBg" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_6C67cXZNSbCWEWLAN5_R2w" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm__WDB6E18T6Gup6TVQCKUbg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_tLy_Dq63O9vnRYHXd0zM-Q" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_tLy_Dq63O9vnRYHXd0zM-Q"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div><div><span style="font-size:14px;">Blog courtesy of KnowBe4</span></div><p><span style="font-size:14px;">Written by Stu Sjouwerman</span><br></p></div></div>
</div><div data-element-id="elm_3mjB-29c7RdhmDcheD_hTA" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> [data-element-id="elm_3mjB-29c7RdhmDcheD_hTA"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="size-original" data-size-mobile="size-original" data-align="right" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimagetext-container zpimage-with-text-container zpimage-align-right zpimage-size-medium zpimage-tablet-fallback-medium zpimage-mobile-fallback-medium hb-lightbox " data-lightbox-options="
            type:fullscreen,
            theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Images/Medium/iStock-957855506.jpg" size="medium" data-lightbox="true" style="width:1288px;padding:0px;margin:0px;"/></picture></span></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><div style="color:inherit;"><div> The world’s most dangerous, expensive, and impactful cyberattack can potentially be stopped with little more than a conscientious user who is paying attention. </div>
<br><div><div>It feels like every year I need to be saying “this year is the year of <a href="/ransomware" title="ransomware" target="_blank" rel="">ransomware</a>”. Every year the attacks become more frequent, the number of players increase, the ransom demands get larger, and the payouts reach new unprecedented levels.&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;</div></div>
<div><br></div><div><br></div></div></div></div></div><div data-element-id="elm_587LSM45PCdEV26d7WbSAg" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_587LSM45PCdEV26d7WbSAg"].zprow{ border-radius:1px; } </style><div data-element-id="elm_Yf3quOfsTxM19wwGuLoiXA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-8 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_Yf3quOfsTxM19wwGuLoiXA"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_F6S8kRC9Os-myOnX_swuZQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_F6S8kRC9Os-myOnX_swuZQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div> Most cybersecurity strategies focus on layering in security solutions that prevent, detect, and respond to any kind of malware-based attacks – which includes ransomware. One aspect of the attack chain that can have a material impact on the effectiveness of your ransomware defence is the very prevalent human element. In most cases, phishing attacks are the primary initial attack vector, causing your users to stand squarely in between the ransomware attack and your organisation. </div>
<div><br></div><div> No single security solution can stop every attack, so it makes sense that because ransomware gangs – in part – require users to interact with malicious email content to enable an attack, educating those users via Security Awareness Training to spot an attack to stop it from ever continuing. </div>
<div><br></div><div><div>So, your ransomware defence strategy should start with <a href="/security-awareness-training" title="Security Awareness Training" target="_blank" rel="">Security Awareness Training</a> because you have no guarantee that the next attack will be stopped by solutions. But a user can make the difference between a boring normal workday and one where your entire operations has come to a screeching halt.&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;&nbsp;</div></div>
</div></div></div></div><div data-element-id="elm_LiVheRlYJi4oUfD4wnsEjQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_LiVheRlYJi4oUfD4wnsEjQ"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_8NlPoQtTt8dp6IqB7SGe_Q" data-element-type="image" class="zpelement zpelem-image "><style> [data-element-id="elm_8NlPoQtTt8dp6IqB7SGe_Q"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="size-original" data-size-mobile="size-original" data-align="center" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimage-container zpimage-align-center zpimage-size-original zpimage-tablet-fallback-original zpimage-mobile-fallback-original "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="https://info.knowbe4.com/demo_kcm_partner?partnerid=0010c00001ywD8SAAU" target="_blank" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Images/Other/KCM_Demo.jpg" size="original"/></picture></a></figure></div>
</div></div></div><div data-element-id="elm_j1GPNhCyG2T9p4uNG17NLQ" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_j1GPNhCyG2T9p4uNG17NLQ"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-center " data-editor="true">Free <span style="font-weight:700;">Ransomware Simulator Tool</span></h2></div>
<div data-element-id="elm_-2vkxbLxB2YzRFBtSWUGUw" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_-2vkxbLxB2YzRFBtSWUGUw"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div>Threat actors are constantly coming out with new strains to evade detection. Is your network effective in blocking all of them when employees fall for social engineering attacks?</div><p><br></p><div>KnowBe4’s &quot;RanSim&quot; gives you a quick look at the effectiveness of your existing network protection. RanSim will simulate 22 ransomware infection scenarios and 1 cryptomining infection scenario and show you if a workstation is vulnerable.</div></div>
</div><div data-element-id="elm_jn_Bv_RZV2kptnSAWJFZQw" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> [data-element-id="elm_jn_Bv_RZV2kptnSAWJFZQw"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="size-original" data-size-mobile="size-original" data-align="right" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimagetext-container zpimage-with-text-container zpimage-align-right zpimage-size-medium zpimage-tablet-fallback-medium zpimage-mobile-fallback-medium "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="https://info.knowbe4.com/one-on-one-demo-partners?partnerid=0010c00001ywD8SAAU" target="_blank" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Images/Other/RanSim1.png" size="medium" data-lightbox="false" style="width:500px;padding:0px;margin:0px;"/></picture></a></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><div>Here's how it works:</div><p><span style="color:inherit;"><br></span></p><div><ul><ul><li>100% harmless simulation of real ransomware and cryptomining infections</li><li>Does not use any of your own files</li><li>Tests 21 types of infection scenarios</li><li>Just download the install and run it&nbsp;</li><li>Results in a few minutes!</li></ul></ul></div></div>
</div></div><div data-element-id="elm_lakf-woJRpOS3VFy2y1mcg" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_lakf-woJRpOS3VFy2y1mcg"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-left "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-lg zpbutton-style-oval " href="https://info.knowbe4.com/ransomware-simulator-tool-partner?partnerid=0010c00001ywD8SAAU" target="_blank"><span class="zpbutton-content">Get RanSim!</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Fri, 20 Aug 2021 13:45:50 +0000</pubDate></item><item><title><![CDATA[Ransomware Attacks This Year Are Already Higher Than 2020]]></title><link>https://www.actisofttechnology.com/blogs/post/ransomware-attacks-this-year-are-already-higher-than-2020</link><description><![CDATA[<img align="left" hspace="5" src="https://www.actisofttechnology.com/Images/Small/iStock-516794972s.jpg"/>Blog courtesy of KnowBe4 Written by Stu Sjouwerman According to the 2021 Cyber Threat Report by SonicWall, 304.7 million ransomware attacks occurred in ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_q9Zjddl-TNe5PvSMvevRBg" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_6C67cXZNSbCWEWLAN5_R2w" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm__WDB6E18T6Gup6TVQCKUbg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_tLy_Dq63O9vnRYHXd0zM-Q" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_tLy_Dq63O9vnRYHXd0zM-Q"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div><div><span style="font-size:14px;">Blog courtesy of KnowBe4</span></div><p><span style="font-size:14px;">Written by Stu Sjouwerman</span><br></p></div></div>
</div><div data-element-id="elm_3mjB-29c7RdhmDcheD_hTA" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> [data-element-id="elm_3mjB-29c7RdhmDcheD_hTA"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="size-original" data-size-mobile="size-original" data-align="right" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimagetext-container zpimage-with-text-container zpimage-align-right zpimage-size-medium zpimage-tablet-fallback-medium zpimage-mobile-fallback-medium hb-lightbox " data-lightbox-options="
            type:fullscreen,
            theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Images/Medium/iStock-824126456.jpg" size="medium" data-lightbox="true" style="width:1278px;padding:0px;margin:0px;"/></picture></span></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><span style="color:inherit;"><div><div>According to the 2021 Cyber Threat Report by SonicWall, 304.7 million <a href="/ransomware" title="ransomware" target="_blank" rel="">ransomware</a> attacks occurred in the first half of 2021, already surpassing the total number of ransomware attacks for all of 2020 with 304.6 million (a 151% increase YTD).</div></div><br><div>The increase in ransomware attacks are due to the shift to remote work, allowing threat actors to take advantage.&nbsp;</div><br><div></div><div>In a statement by SonicWall CEO, Bill Conner, commented “In a year driven by anxiety and uncertainty, cybercriminals have continued to accelerate attacks against innocent people and vulnerable institutions. This latest data shows that sophisticated threat actors are tirelessly adapting their tactics and embracing ransomware to reap financial gain and sow discord.&quot;</div></span></div>
</div></div><div data-element-id="elm_587LSM45PCdEV26d7WbSAg" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_587LSM45PCdEV26d7WbSAg"].zprow{ border-radius:1px; } </style><div data-element-id="elm_Yf3quOfsTxM19wwGuLoiXA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-8 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_Yf3quOfsTxM19wwGuLoiXA"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_F6S8kRC9Os-myOnX_swuZQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_F6S8kRC9Os-myOnX_swuZQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><span style="color:inherit;"><div>The spikes in volume of ransomware have occurred in the US at a rate of 185% and 144% in the UK. The top industries being targeted are government (917%), education (615%), healthcare (594%), and retail (264%) companies. June 2021 was the worst month with SonicWall reporting 78.4 million registered ransomware attacks.&nbsp;</div><div><br></div><div><div>These alarming stats should be a warning for your organisation. One malicious email could cost your organisation millions. It's important to utilise additional security layers to prevent an attack from ever occurring. The most recommended method is implementing new-school <a href="/security-awareness-training" title="security awareness training" target="_blank" rel="">security awareness training</a> to ensure your employees know how to spot and report any suspicious activity.&nbsp;</div></div><br><div><div>TechRadar Pro has the full <a href="https://www.techradar.com/news/ransomware-attacks-in-2021-have-already-surpassed-last-year" title="story" target="_blank" rel="">story</a>.&nbsp;</div></div></span></div>
</div></div><div data-element-id="elm_LiVheRlYJi4oUfD4wnsEjQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_LiVheRlYJi4oUfD4wnsEjQ"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_8NlPoQtTt8dp6IqB7SGe_Q" data-element-type="image" class="zpelement zpelem-image "><style> [data-element-id="elm_8NlPoQtTt8dp6IqB7SGe_Q"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="size-original" data-size-mobile="size-original" data-align="center" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimage-container zpimage-align-center zpimage-size-original zpimage-tablet-fallback-original zpimage-mobile-fallback-original "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="https://info.knowbe4.com/demo_kcm_partner?partnerid=0010c00001ywD8SAAU" target="_blank" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Images/Other/KCM_Demo.jpg" size="original"/></picture></a></figure></div>
</div></div></div><div data-element-id="elm_j1GPNhCyG2T9p4uNG17NLQ" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_j1GPNhCyG2T9p4uNG17NLQ"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-center " data-editor="true">Free <span style="font-weight:700;">Ransomware Simulator Tool</span></h2></div>
<div data-element-id="elm_-2vkxbLxB2YzRFBtSWUGUw" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_-2vkxbLxB2YzRFBtSWUGUw"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div>Threat actors are constantly coming out with new strains to evade detection. Is your network effective in blocking all of them when employees fall for social engineering attacks?</div><p><br></p><div>KnowBe4’s &quot;RanSim&quot; gives you a quick look at the effectiveness of your existing network protection. RanSim will simulate 22 ransomware infection scenarios and 1 cryptomining infection scenario and show you if a workstation is vulnerable.</div></div>
</div><div data-element-id="elm_jn_Bv_RZV2kptnSAWJFZQw" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> [data-element-id="elm_jn_Bv_RZV2kptnSAWJFZQw"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="size-original" data-size-mobile="size-original" data-align="right" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimagetext-container zpimage-with-text-container zpimage-align-right zpimage-size-medium zpimage-tablet-fallback-medium zpimage-mobile-fallback-medium "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="https://info.knowbe4.com/one-on-one-demo-partners?partnerid=0010c00001ywD8SAAU" target="_blank" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Images/Other/RanSim1.png" size="medium" data-lightbox="false" style="width:500px;padding:0px;margin:0px;"/></picture></a></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><div>Here's how it works:</div><p><span style="color:inherit;"><br></span></p><div><ul><ul><li>100% harmless simulation of real ransomware and cryptomining infections</li><li>Does not use any of your own files</li><li>Tests 21 types of infection scenarios</li><li>Just download the install and run it&nbsp;</li><li>Results in a few minutes!</li></ul></ul></div></div>
</div></div><div data-element-id="elm_lakf-woJRpOS3VFy2y1mcg" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_lakf-woJRpOS3VFy2y1mcg"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-left "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-lg zpbutton-style-oval " href="https://info.knowbe4.com/ransomware-simulator-tool-partner?partnerid=0010c00001ywD8SAAU" target="_blank"><span class="zpbutton-content">Get RanSim!</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Wed, 04 Aug 2021 07:39:00 +0000</pubDate></item></channel></rss>