The Latest from Ethos

News & Resource Articles

Encryption Free Attacks

August 19th, 2020 by Ethos Technologies

Outline of a key against a green, circuit board background

Ransomware has now come full circle. The ability to encrypt files was one of the core capabilities needed to make ransomware a viable cyber crime. However, cyber criminals no longer need to encrypt your files to hold you hostage. Why? Because they’ll...

Read Full Story »

Posted in: Cyber Security

Playing Cat & Mouse

July 28th, 2020 by Ethos Technologies

Ransomware locks on icons of file folders

Once ransomware became mainstream, the cyber criminals focused their efforts on refining and enhancing their attacks in order to increase revenue. This included: Branding Savvy cyber criminals realized that people would only pay...

Read Full Story »

Posted in: Cyber Security

Evolution of Ransomware

July 17th, 2020 by Ethos Technologies

Hacker at work with graphic user interface around them displaying code and the word 'LOCKED' to represent how ransomware is evolving.

Ransomware is not new. In fact, the first cyber ransomware attack was released in December of 1989. Dr. Joseph V. Popp mailed out 20,000 floppy disks infected with the AIDS Information Trojan. The program purported to be an expert system to advise you...

Read Full Story »

Posted in: Cyber Security

Understanding Ransomware

July 12th, 2020 by Ethos Technologies

3D rendering of a reddish-orange metallic safe with a padlock on it, representing how ransomware locks your data from you.

Thirty years on from the world’s first cyber ransomware attack, cyber criminals continue holding organizations hostage, maliciously encrypting their file and demanding hefty ransoms for the safe return of the data. Indeed, while headlines come and go,...

Read Full Story »

Posted in: Cyber Security

Maintain Your Business with a Professional IT Security Company

September 30th, 2019 by Ethos Technologies

Man in a suit holding out a sphere graphic that has a lock icon on the top with both hands.

How to Choose the Best IT Security Provider Protecting your business is crucial to maintaining success. With the amount of software and technology required to operate with high functionality, this can be rather complex. Find the right company that will...

Read Full Story »

Posted in: Cyber Security, Managed IT Services