The BlueDoom ransom-worm

The BlueDoom ransom-worm

TL/DR: BlueDoom can encrypt and ransom your computer without your interaction. Protect yourself with the Holy Trifecta of backups, updates, active border and endpoint protection. Another “ransom-worm” is spreading itself across the Internet, and this time...

How to baseline your business computers

Creating a baseline of your business’s computers, software, and mobile devices is the first step to getting your cyber security in hand. Why create a computer baseline? A baseline is like an advanced inventory. It tells you what computers exist, what operating...