The Latest from Ethos

News & Resource Articles

Problems Happen, Are You Ready?

August 29th, 2020 by Ethos Technologies

Laptop displaying 'HELPDESK' on the screen

In the world of IT, problems happen. Computers crash, passwords are lost, email stops working, and the list goes on. And without proper technical support in place, these problems can bring your business to an abrupt – and potentially damaging – halt....

Read Full Story »

Posted in: Managed IT Services

How To Defend Against Ransomware

August 24th, 2020 by Ethos Technologies

Hexagonal array representing digital security overlaying map of the world

Ransomware has evolved into a highly advanced, highly complex threat – and it’s only going to evolve further. With that in mind, how can you minimize your risk of being affected by ransomware? The answer is that you need to make it as hard as possible...

Read Full Story »

Posted in: Cyber Security

Encryption Free Attacks

August 19th, 2020 by Ethos Technologies

Outline of a key against a green, circuit board background

Ransomware has now come full circle. The ability to encrypt files was one of the core capabilities needed to make ransomware a viable cyber crime. However, cyber criminals no longer need to encrypt your files to hold you hostage. Why? Because they’ll...

Read Full Story »

Posted in: Cyber Security

Service Provider Attacks

August 12th, 2020 by Ethos Technologies

The second area where we expect to see growth in ransomware is service provider attacks. As technology and threats become ever more complex, companies are increasingly outsourcing their IT to specialist managed service providers (MSPs). These MSPs manage...

Read Full Story »

Posted in: Cyber Security

Public Cloud Ransomware

August 7th, 2020 by Ethos Technologies

Blue outline of clouds against a background of digital concepts

What’s next for ransomware? First on the list is public cloud ransomware, by which we mean ransomware that targets and encrypts data stored in public cloud services like Amazon Web Services (AWS), Microsoft Azure (Azure), and Google Cloud Platform...

Read Full Story »

Posted in: Cyber Security

Ransomware Evolved: Ryuk

August 2nd, 2020 by Ethos Technologies

Ransomware concept of hackers and threats around the world

Ryuk is arguably the most evolved form of ransomware around today, named after a character in the manga series Death Note. The actors behind Ryuk typically target organizations that cannot withstand any downtime, such as newspapers, municipalities,and...

Read Full Story »

Posted in: Cyber Security

Playing Cat & Mouse

July 28th, 2020 by Ethos Technologies

Ransomware locks on icons of file folders

Once ransomware became mainstream, the cyber criminals focused their efforts on refining and enhancing their attacks in order to increase revenue. This included: Branding Savvy cyber criminals realized that people would only pay...

Read Full Story »

Posted in: Cyber Security

Exploiting Opportunities

July 23rd, 2020 by Ethos Technologies

Ransomware lock against a digital background of ones and zeroes

The AIDS Information Trojan attack did have one hallmark of success: it took advantage of a wider environmental opportunity, namely the widespread concern around HIV/AIDS at that time. Since then, cyber criminals have continued to take advantage of developments...

Read Full Story »

Posted in: Cyber Security

Evolution of Ransomware

July 17th, 2020 by Ethos Technologies

Ransomware is not new. In fact, the first cyber ransomware attack was released in December of 1989. Dr. Joseph V. Popp mailed out 20,000 floppy disks infected with the AIDS Information Trojan. The program purported to be an expert system to advise you...

Read Full Story »

Posted in: Cyber Security

Understanding Ransomware

July 12th, 2020 by Ethos Technologies

Thirty years on from the world’s first cyber ransomware attack, cyber criminals continue holding organizations hostage, maliciously encrypting their file and demanding hefty ransoms for the safe return of the data. Indeed, while headlines come and go,...

Read Full Story »

Posted in: Cyber Security