Blog

Blog

Why You Need to Implement Cyber Security Training Today

 

We all want to believe that we are smart and agile enough to tell which emails are legit and which emails are obviously scams. Unfortunately, the data shows otherwise. From Verizon's 2021 Data Breach Investigations Report (DBIR) we have learned that 85% of all breaches were due to human error. If you want a quick way to see if you'd be duped by modern phishing attempts, check out this quick test we put together for you.

 

The solution to mitigating this huge margin for error is to regularly train your employees. While this sounds like a monumental task, there are options that make this process surprisingly streamlined and approachable.

Read More »

Ransomware Attacks are Surging: How Your Business Can Fight Back

 

Ransomware attacks are on the rise. In 2021 alone, businesses around the world were victims of a 105% increase in attacks. Sonicwall’s 2022 Cyber Threat Report also notes a 755% increase in the healthcare industry and a 1,885% increase in attacks on governments worldwide. 

 

One result of the COVID19 pandemic is that businesses around the world are utilizing remote workers, creating a bevy of new opportunities for cybercriminals to exploit digital information. Ransoms are high – JBS USA, the world’s largest meat supplier, paid an $11 million fee in Bitcoin to end their digital hijacking for instance – and even the average setback in 2021 was $1.85 million. 

Read More »

5 Crucial Steps to Take After Your Email Has Been Compromised

Written by Hope Rickerd and Tom Farr, PTG employees

 

Your phone dings. The message is dire. You’ve suspected the worst. And the worst has happened: An account on your network – maybe even your own – has been compromised. 

 

The good news is a breach can be isolated and managed, especially if you’ve taken proper preventative measures. The fight to mitigate risk begins with a solid data security plan but continues every day. In the unfortunate and problematic event that you are compromised, use the steps below to help guide what you and your team should do immediately. 

 

Read More »

What To Do After You've Been Hit With Ransomware

Normally we like to start these blogs off with a fun little quip. Maybe a quote from a TV show or some kind of fun bit. You know, fun stuff.  

 

But let’s face it – if you’re here reading about what to do AFTER you’ve been hit with a ransomware attack, you’re probably not in the mood for the fun stuff. In fact, there’s not much you’ll be focusing on in the near future besides this topic. 

 

If you’re here by accident or you’re just really curious and want to be super prepared, that’s great, too! In fact, that’s a pretty awesome thing for you to do.

 

Read More »

How to Tell if You've Been Hit with Ransomware

 

Businesses of all sizes, especially those 100+, are known to be targets of ransomware. The healthcare sector takes the brunt of the attempts, but everyone from restaurants to car dealerships is in danger – if you collect data, you’re at risk.  

 

As you’re taking the necessary steps to protect yourself from a broad range of cyberattacks, it’s critical you and your team be well aware of the threats, particularly when it comes to one of the digital criminal’s favorite tools.  

 

So let’s discuss what exactly ransomware is, how to detect it within your network, and, of course, what to do if you run into a problem.  

Read More »
   
New Call-to-action

Posts by Topic

see all