The Latest from Ethos

News & Resource Articles

Encryption Free Attacks

August 19th, 2020 by Ethos Technologies

Outline of a key against a green, circuit board background

Ransomware has now come full circle. The ability to encrypt files was one of the core capabilities needed to make ransomware a viable cyber crime. However, cyber criminals no longer need to encrypt your files to hold you hostage. Why? Because they’ll...

Read Full Story »

Posted in: Cyber Security

Ransomware Evolved: Ryuk

August 2nd, 2020 by Ethos Technologies

Ransomware concept of hackers and threats around the world

Ryuk is arguably the most evolved form of ransomware around today, named after a character in the manga series Death Note. The actors behind Ryuk typically target organizations that cannot withstand any downtime, such as newspapers, municipalities,and...

Read Full Story »

Posted in: Cyber Security

Playing Cat & Mouse

July 28th, 2020 by Ethos Technologies

Ransomware locks on icons of file folders

Once ransomware became mainstream, the cyber criminals focused their efforts on refining and enhancing their attacks in order to increase revenue. This included: Branding Savvy cyber criminals realized that people would only pay...

Read Full Story »

Posted in: Cyber Security

Exploiting Opportunities

July 23rd, 2020 by Ethos Technologies

Ransomware lock against a digital background of ones and zeroes

The AIDS Information Trojan attack did have one hallmark of success: it took advantage of a wider environmental opportunity, namely the widespread concern around HIV/AIDS at that time. Since then, cyber criminals have continued to take advantage of developments...

Read Full Story »

Posted in: Cyber Security

Efficiency of Co-Managed IT

July 7th, 2020 by Ethos Technologies

Black and white male hands fist-bumping

A common concern we hear about cyber defense and IT network management is staffing. Many customers say they would need to double their security headcount to maintain the same level of protection when we speak to a full-service solution. One large U.S....

Read Full Story »

Posted in: Cyber Security, Managed IT Services

Finding Your Fit – Cyber Security

July 2nd, 2020 by Ethos Technologies

Businessman holding a clear tablet with a floating lock symbol in the air above it

How Do You Quantify the Real-Life Protection and Efficiency Benefits of Your Cyber Security System? Choosing a cyber defense firm for your threat protection can seem like a daunting task. How do I know what I need, how do I know if I’m being proactive...

Read Full Story »

Posted in: Cyber Security

Why Cyber Insurance Is Necessary

June 30th, 2020 by Ethos Technologies

A outstretched finger reaching for a holographic display that is displaying a shield with a padlock icon on it to represent cyber insurance.

Filing and Smiling When is the last time that you filed a piece of paper? It used to be that a file cabinet was like your personal bank vault – holding the papers that defined and valued a business. From employee records to bank statements, that file...

Read Full Story »

Posted in: Cyber Security

What Is Your Personal Information Worth on the Dark Web?

June 12th, 2020 by Ethos Technologies

A  hacker whose face is obscured by a hoodie, using a graphic user interface to take personal information to sell on the dark web.

The dark web is often known for the illegal activities conducted there, and while not everything on the dark web is illegal, it’s most appealing factor is its anonymity. The dark web is often a place where stolen data and personal information is bought...

Read Full Story »

Posted in: Cyber Security

A New Approach to Healthcare Cyber Security

June 7th, 2020 by Ethos Technologies

Closeup of a doctor sitting at a table  typing on a device, with multiple charts, icons, and graphics being displayed to represent healthcare cyber security.

A New Approach to an Old Problem Resistance to yet another government regulation, a lack of understanding the complexities of the rules, and an overall unwillingness to take on yet another area of expertise in an ever-changing technical landscape can...

Read Full Story »

Posted in: Cyber Security

Cybercriminals Taking Advantage of COVID-19

May 4th, 2020 by Ethos Technologies

A figure with their face obscured standing behind multiple lines of code.

With unprecedented numbers of people working from home, cybercriminals are more prolific than ever. Looking for new updates on the virus, consumers are more likely to fall for phishing, scams, and malware threats. The increase in online ordering and...

Read Full Story »

Posted in: Cyber Security

USB Drives Could Be Huge Factor in Data Loss

May 15th, 2018 by Ethos Technologies

Close up of a USB stick being plugged into a laptop

How USB Drives Can Affect Your Data Most people agree that the use of USB drives increases efficiency and boosts productivity, which goes a long way toward explaining their popularity, but these handy little drives can also be problematic. According...

Read Full Story »

Posted in: Cyber Security

Large Number of HP Models May Have Keyloggers

May 4th, 2018 by Ethos Technologies

Close up view of keyboard with 'Keylogger' in red and white

HP is in the news again. If you missed the initial story, earlier in the year, it was reported that an audio driver that came pre-installed on a number of HP laptops contained keylogging code that stored every key stroke made by the person using the...

Read Full Story »

Posted in: General

Data on 123 Million US Households Leaked Online

January 2nd, 2018 by Ethos Technologies

Hacker in hoodie using a laptop, created from ones and zeroes

US Household Data Leaked Online Security researchers at UpGuard recently made a terrifying discovery in finding an unprotected Amazon S3 server containing several databases belonging to a data analytics provider called Alteryx. While the server contained...

Read Full Story »

Posted in: Cyber Security

Popular Android Keyboard App Breached

January 2nd, 2018 by Ethos Technologies

Close up of a woman's hands holding and using an Android phone

How many apps do you have on your smartphone? Do you know how much data they’re collecting about you? Most people have scores of apps installed (and often hundreds), even if they only use a few on a regular basis, and shockingly, most users have no...

Read Full Story »

Posted in: Cyber Security