News and Perspectives

News and Perspectives
News and Perspectives

Statistics on Ransomware

Ransomware remains the most prominent malware threat. (Datto, 2019) Malicious emails are up 600% due to COVID-19. (ABC News, 2021) 37% of respondents’ organizations were affected by ransomware attacks in the last year. (Sophos, 2021) In 2021, the largest ransomware payout was made by an insurance company at $40 million, setting a world record. (Business […]

SentinelOne takes care of Microsoft Vulnerability Follina!

A vulnerability called Follina exploits the way ms-msdt handles URLs. In its simplest form, the call to ms-msdt allows an attacker to execute code on a system. This vulnerability affects all versions of Windows currently supported by Microsoft. SentinelOne’s AI-powered technology provided autonomous detection and response to take on Follina. Simply Secure uses SentinelOne’s autonomous […]

Lookout Mobile Threat Detection and Response partners with Simply Secure Group!

Simply Secure Group is proud to announce a partnership with Lookout Mobile Threat Detection and Response, the leading cybersecurity provider of Integrated Endpoint-to-Cloud Security. This new partnership will provide Simply Secure Group’s customers and community with mobile threat response, allowing full End to End cyber-security protection for all devices.     About Simply Secure Simply […]

Dos and Don’ts in Handling the First 24 to 48 Hours of a Cyber Attack

The steps you take within the first 24 to 48 hours of a security breech is crucial. These decisions can have a long-term effect on your company’s reputation, finances, and legal implications. It’s important to already have an Incident Response plan in place prior to any attacks. Here’s a list of things to do and […]

Quarter One Achievements

So what have we been up to? Glad you asked! 1. We have upgraded our customer support platform which now features a full cloud-based contact center with Multi-channel (Live-Chat, Email, Social Media, Phone & Text) support. 2. We’ve also revamped and streamlined our IVR to enhance the user experience with our agents. 3. YES! We […]

Different Types of Hackers

  Black Hat: A Black Hat hacker violates computer security for their own personal profit or out of malice. Black hat hackers break into secure networks and systems with the motive of destroying, modifying, or stealing some sensitive data, or to make the networks unusable for authorized network users. Black hat hackers form the stereotypical, […]

Understanding How Hackers Recon

Understanding How Hackers Recon March 07, 2022The Hacker News Cyber-attacks keep increasing and evolving but, regardless of the degree of complexity used by hackers to gain access, get a foothold, cloak their malware, execute their payload or exfiltrate data, their attack will begin with reconnaissance. They will do their utmost to uncover exposed assets and […]

HermeticWiper | New Destructive Malware Used In Cyber Attacks on Ukraine

Article Written By:  Juan Andrés Guerrero-Saade / February 23, 2022 Executive Summary On February 23rd, the threat intelligence community began observing a new wiper malware sample circulating in Ukrainian organizations. Our analysis shows a signed driver is being used to deploy a wiper that targets Windows devices, manipulating the MBR resulting in subsequent boot failure. […]