General Blog

Rise of Double Extortion Ransomware and How IT Support Can Help Safeguard Your Business

What is Double Extortion Ransomware? The classic ransomware scenario involved malicious programmes encrypting files with public-key RSA encryption and then deleting them if the victim did not pay the ransom. However, following the ransomware attacks WannaCry and NotPetya in 2017, businesses increased their cyber defences. The businesses focused more on backup and restoration operations. This …

Rise of Double Extortion Ransomware and How IT Support Can Help Safeguard Your Business Read More »

Top 6 Ransomware Attacks in Australia and How to Prevent Them

Ransomware is malware that is used by cybercriminals to encrypt victims’ data until some form of ransom is paid. As such, the victim, be it an individual or a company cannot access vital applications, databases and files. These criminals, or digital extortionists, encrypt important data and only after the ransom is paid do they give …

Top 6 Ransomware Attacks in Australia and How to Prevent Them Read More »

Cameron Rule Graduates as WA Leader

Throughout 2020 our Director Cameron Rule attended WA Leaders, an organization aimed at inspiring companies through knowledge, connections, and resources. The Executive Leaders Series allowed Cam to connect with and learn alongside people from 24 different companies. He attended several knowledge workshops delivered by Industry Experts, focused on real-time strategic opportunities, and ‘Ask The Expert’ …

Cameron Rule Graduates as WA Leader Read More »

Top Tips On How To Prevent An Advanced Persistent Threat (APT)

Survey reports across Australia have shown that APT threats are a major concern for most IT professionals. This is why advanced persistent threat protection should be a priority for any organisation, big or small. Surprisingly, many IT managers still do not understand what APT threats entail. Here is more insight on the issue. What is …

Top Tips On How To Prevent An Advanced Persistent Threat (APT) Read More »