Having access to backup copies of critical data is the only way to guarantee avoidance of costly ransomware payments, insurance claims, and extended downtime to business operations. All too often this advice is heard only after experiencing an attack, and in hindsight these simple steps seem obvious. During ransomware incidents technology staff are commonly not aware of techniques used by these criminals to take advantage of ineffective backup routines. In our experience conducting incident response recent ransomware events involve the targeting of backup processes. Reconfiguration of backup technologies, deletion of cloud storage environments, and destruction of backup data discovered in their attack are all used to prevent you from a simple recovery. When you wake up to discover encrypted systems, there are literally no copies of your critical data left to be restored, your business operations are crippled, and the only path forward is negotiations with criminals. This is, as te
Making improvements in our services is one of our top priorities. The feedback we get from clients is invaluable in connecting with the needs of others and making sure our solutions remain effective. This is a great opportunity to share the feedback we've got on our PhishSeine service. The social-engineering platform provides our clients with the ability to test their users susceptibility to phishing attacks and provide on-the-spot training to those users that need it. The first key difference in our service is the lack of a need for whitelisting. Other vendor's solutions require you to whitelist their servers so that the messages bypass traditional spam and email filtering. We feel that this is cheating, if our campaigns aren't good enough to bypass your spam filters, then either you have very effective filtering (whitelisting) or we're not good enough at our jobs. The second key difference is our ability to custom tailor the experience to your users, ea