The Latest from Ethos

News & Resource Articles

Encryption Free Attacks

August 19th, 2020 by Ethos Technologies

Outline of a key against a green, circuit board background

Ransomware has now come full circle. The ability to encrypt files was one of the core capabilities needed to make ransomware a viable cyber crime. However, cyber criminals no longer need to encrypt your files to hold you hostage. Why? Because they’ll...

Read Full Story »

Posted in: Cyber Security

Service Provider Attacks

August 12th, 2020 by Ethos Technologies

A graphic of multiple connected circles over code with some of the circles turning red, showing how a service provider being hacked can spread and affect their clients.

The second area where we expect to see growth in ransomware is service provider attacks. As technology and threats become ever more complex, companies are increasingly outsourcing their IT to specialist managed service providers (MSPs). These MSPs manage...

Read Full Story »

Posted in: Cyber Security

Understanding Ransomware

July 12th, 2020 by Ethos Technologies

3D rendering of a reddish-orange metallic safe with a padlock on it, representing how ransomware locks your data from you.

Thirty years on from the world’s first cyber ransomware attack, cyber criminals continue holding organizations hostage, maliciously encrypting their file and demanding hefty ransoms for the safe return of the data. Indeed, while headlines come and go,...

Read Full Story »

Posted in: Cyber Security

Efficiency of Co-Managed IT

July 7th, 2020 by Ethos Technologies

Black and white male hands fist-bumping

A common concern we hear about cyber defense and IT network management is staffing. Many customers say they would need to double their security headcount to maintain the same level of protection when we speak to a full-service solution. One large U.S....

Read Full Story »

Posted in: Cyber Security, Managed IT Services

Finding Your Fit – Cyber Security

July 2nd, 2020 by Ethos Technologies

Businessman holding a clear tablet with a floating lock symbol in the air above it

How Do You Quantify the Real-Life Protection and Efficiency Benefits of Your Cyber Security System? Choosing a cyber defense firm for your threat protection can seem like a daunting task. How do I know what I need, how do I know if I’m being proactive...

Read Full Story »

Posted in: Cyber Security

Why Cyber Insurance Is Necessary

June 30th, 2020 by Ethos Technologies

A outstretched finger reaching for a holographic display that is displaying a shield with a padlock icon on it to represent cyber insurance.

Filing and Smiling When is the last time that you filed a piece of paper? It used to be that a file cabinet was like your personal bank vault – holding the papers that defined and valued a business. From employee records to bank statements, that file...

Read Full Story »

Posted in: Cyber Security

HIPAA Compliance & Cybersecurity

June 24th, 2020 by Ethos Technologies

A doctor reaching out and touching the word 'HIPAA' in a hexagon that is connected to other hexagons that have healthcare-related icons in them.

HIPAA Compliance & Cybersecurity If your organization is following all of the rules that are created by both federal and statewide regulations, you are likely compliant to those respective requirements and may fall under the false impression that you...

Read Full Story »

Posted in: Cyber Security

What Is Your Personal Information Worth on the Dark Web?

June 12th, 2020 by Ethos Technologies

A  hacker whose face is obscured by a hoodie, using a graphic user interface to take personal information to sell on the dark web.

The dark web is often known for the illegal activities conducted there, and while not everything on the dark web is illegal, it’s most appealing factor is its anonymity. The dark web is often a place where stolen data and personal information is bought...

Read Full Story »

Posted in: Cyber Security

How Does the Dark Web Impact Small Businesses?

May 20th, 2020 by Ethos Technologies

A figure with their face obscured with a hoodie, typing on two keyboards with bright orange text related to hacking floating around them.

Identity theft is an unfortunate occurrence that is all too familiar with most business owners, but do those individuals know where the compromised data will end up? Often, these business owners are unaware of the virtual marketplace where stolen data...

Read Full Story »

Posted in: Cyber Security

Cyber Security - Out, Cyber Defense - In

April 15th, 2020 by Ethos Technologies

A bright red 3D shield over a code, representing cyber security

Security and defense are often words that are used interchangeably. So let’s start by defining each. Security: the state of being free from danger or threat Defense: the action of defending from or resisting attack The key difference, ACTION. ...

Read Full Story »

Posted in: Cyber Security

Benefits of Using a Managed Services Provider for Your IT Needs

March 31st, 2020 by Ethos Technologies

Close up of a person using a stylus to draw on a transparent screen that is covered in charts and graphs.

Small and medium sized businesses often times have IT departments that are stretched thin and operating with limited resources. This means updates, network management, and security can fall behind, leaving data at risk. Managed IT, or Managed Services...

Read Full Story »

Posted in: Managed IT Services

Maintain Your Business with a Professional IT Security Company

September 30th, 2019 by Ethos Technologies

Man in a suit holding out a sphere graphic that has a lock icon on the top with both hands.

How to Choose the Best IT Security Provider Protecting your business is crucial to maintaining success. With the amount of software and technology required to operate with high functionality, this can be rather complex. Find the right company that will...

Read Full Story »

Posted in: Cyber Security, Managed IT Services

USB Drives Could Be Huge Factor in Data Loss

May 15th, 2018 by Ethos Technologies

Close up of a USB stick being plugged into a laptop

How USB Drives Can Affect Your Data Most people agree that the use of USB drives increases efficiency and boosts productivity, which goes a long way toward explaining their popularity, but these handy little drives can also be problematic. According...

Read Full Story »

Posted in: Cyber Security

Data on 123 Million US Households Leaked Online

January 2nd, 2018 by Ethos Technologies

Hacker in hoodie using a laptop, created from ones and zeroes

US Household Data Leaked Online Security researchers at UpGuard recently made a terrifying discovery in finding an unprotected Amazon S3 server containing several databases belonging to a data analytics provider called Alteryx. While the server contained...

Read Full Story »

Posted in: Cyber Security