Greystone Security & Productivity Webinars – August
Greystone is hosting two free webinars this month – join us to learn more about emerging cybersecurity threats and Microsoft OneDrive! Cybersecurity Essentials: Emerging Threats Ransomware, Business Email Compromise/Email Spoofing, and The Internet of Things are just a few examples of the topics that will be covered in this training. Technology is evolving quickly, and […]
Companies are taking a beating from cyberattacks, but there are ways to stay safe.
It has been a rough first half of 2018 for cybersecurity professionals. Two of the higher profile cyberattacks are still in the news and still racking up costs. The City of Atlanta was devastated after a SamSam ransomware attack knocked nearly all digital services out of commission. Closer to home, the Colorado Department of Transportation […]
Security Bulletin: Cyberattack Threat Level Remains High
While the frenzy over recent ransomware attacks like WannaCry, NotPetya, and SyncCrypt has died down, we do not see a decrease in the overall number of ransomware and phishing attacks. Spear-phishing, in particular, remains a constant threat affecting even the smallest organizations. Cybersecurity threats are becoming increasingly sophisticated in their approaches, using public sources of information […]
Cybersecurity Bulletin: SyncCrypt Ransomware
A new ransomware cybersecurity attack has been discovered this week. The SyncCrypt ransomware email is disguised as a court order and is difficult to detect as it pulls components for the attacks from seemingly harmless images when the attachment is opened. Currently, the attackers are charging around $430 for the decryption key and there […]
Security Bulletin: NotPetya Ransomware Attack
UPDATED 6/28/2017 14:20 MDT Organizations across the globe -including some in the U.S.- have been struck by the NotPetya ransomware malware. NotPetya initially attacks via a phishing email, exploiting the same vulnerabilities found in un-patched operating systems as the WannaCry attack last May. However, NotPetya also gains administrator access to the network using one of […]