Blog

New ransomware distribution model: Infect two “friends”, unlock your files for free

In our previous blogs, we have looked at ways through which ransomware moves from being malware used by cyber criminals…

August 21, 2023

Should open source ransomware be banned?

Ransomware has been a growing concern since the last couple of years as the rate and cost of the related…

August 21, 2023

Ransomware-as-a-service expected to highly increase the number of cyber criminals

Until recently, ransomware attacks used to be carried out by highly skilled, well-motivated professional cyber attackers. The primary purpose was…

August 21, 2023

EHR adoption is slow for a reason – Ransomware attack forces three hospitals to cancel operations

Almost 3,000 patient appointments and several operations were canceled at three hospitals after a cyber attack involving a variant of…

August 21, 2023

GDPR significantly broadens the scope of data privacy requirements: are you in, or out?

The European Data Privacy Directive (Directive 95/46/EC of the European Parliament), is still the data privacy law in effect today…

August 21, 2023

Tesco Bank: Money stolen from customers’ accounts – thousands affected

Last weekend brought unpleasant surprises for the customers of Tesco Bank, the banking system of a major retailer in the…

August 21, 2023

FBI Urges Ransomware Victims to Report the Attacks

Healthcare organizations in the US fall under the scope of the “Health Information Technology for Economic and Clinical Health (HITECH)…

August 21, 2023

How to monitor Skype file sharing from corporate endpoints

Skype is a popular communication platform, so companies who are concerned with data security, compliance and assessing the risk of…

August 21, 2023

Five ways in which TEMASOFT FileMonitor can help healthcare organizations

Monitoring and analyzing how files are being accessed, how they change, and how they move around the IT environment brings…

August 21, 2023