The Latest from Ethos

News & Resource Articles

Problems Happen, Are You Ready?

August 29th, 2020 by Ethos Technologies

Laptop displaying 'HELPDESK' on the screen

In the world of IT, problems happen. Computers crash, passwords are lost, email stops working, and the list goes on. And without proper technical support in place, these problems can bring your business to an abrupt – and potentially damaging – halt....

Read Full Story »

Posted in: Managed IT Services

How To Defend Against Ransomware

August 24th, 2020 by Ethos Technologies

Hexagonal array representing digital security overlaying map of the world

Ransomware has evolved into a highly advanced, highly complex threat – and it’s only going to evolve further. With that in mind, how can you minimize your risk of being affected by ransomware? The answer is that you need to make it as hard as possible...

Read Full Story »

Posted in: Cyber Security

Encryption Free Attacks

August 19th, 2020 by Ethos Technologies

Outline of a key against a green, circuit board background

Ransomware has now come full circle. The ability to encrypt files was one of the core capabilities needed to make ransomware a viable cyber crime. However, cyber criminals no longer need to encrypt your files to hold you hostage. Why? Because they’ll...

Read Full Story »

Posted in: Cyber Security

Service Provider Attacks

August 12th, 2020 by Ethos Technologies

A graphic of multiple connected circles over code with some of the circles turning red, showing how a ser provider being hacked can spread and affect their clients.

The second area where we expect to see growth in ransomware is service provider attacks. As technology and threats become ever more complex, companies are increasingly outsourcing their IT to specialist managed service providers (MSPs). These MSPs manage...

Read Full Story »

Posted in: Cyber Security

Public Cloud Ransomware

August 7th, 2020 by Ethos Technologies

Blue outline of clouds against a background of digital concepts

What’s next for ransomware? First on the list is public cloud ransomware, by which we mean ransomware that targets and encrypts data stored in public cloud services like Amazon Web Services (AWS), Microsoft Azure (Azure), and Google Cloud Platform...

Read Full Story »

Posted in: Cyber Security

Ransomware Evolved: Ryuk

August 2nd, 2020 by Ethos Technologies

Ransomware concept of hackers and threats around the world

Ryuk is arguably the most evolved form of ransomware around today, named after a character in the manga series Death Note. The actors behind Ryuk typically target organizations that cannot withstand any downtime, such as newspapers, municipalities,and...

Read Full Story »

Posted in: Cyber Security

Playing Cat & Mouse

July 28th, 2020 by Ethos Technologies

Ransomware locks on icons of file folders

Once ransomware became mainstream, the cyber criminals focused their efforts on refining and enhancing their attacks in order to increase revenue. This included: Branding Savvy cyber criminals realized that people would only pay...

Read Full Story »

Posted in: Cyber Security

Exploiting Opportunities

July 23rd, 2020 by Ethos Technologies

Ransomware lock against a digital background of ones and zeroes

The AIDS Information Trojan attack did have one hallmark of success: it took advantage of a wider environmental opportunity, namely the widespread concern around HIV/AIDS at that time. Since then, cyber criminals have continued to take advantage of developments...

Read Full Story »

Posted in: Cyber Security

Evolution of Ransomware

July 17th, 2020 by Ethos Technologies

Hacker at work with graphic user interface around them displaying code and the word 'LOCKED' to represent how ransomware is evolving.

Ransomware is not new. In fact, the first cyber ransomware attack was released in December of 1989. Dr. Joseph V. Popp mailed out 20,000 floppy disks infected with the AIDS Information Trojan. The program purported to be an expert system to advise you...

Read Full Story »

Posted in: Cyber Security

Understanding Ransomware

July 12th, 2020 by Ethos Technologies

3D rendering of a reddish-orange metallic safe with a padlock on it, representing how ransomware locks your data from you.

Thirty years on from the world’s first cyber ransomware attack, cyber criminals continue holding organizations hostage, maliciously encrypting their file and demanding hefty ransoms for the safe return of the data. Indeed, while headlines come and go,...

Read Full Story »

Posted in: Cyber Security

Efficiency of Co-Managed IT

July 7th, 2020 by Ethos Technologies

Black and white male hands fist-bumping

A common concern we hear about cyber defense and IT network management is staffing. Many customers say they would need to double their security headcount to maintain the same level of protection when we speak to a full-service solution. One large U.S....

Read Full Story »

Posted in: Cyber Security, Managed IT Services

Finding Your Fit – Cyber Security

July 2nd, 2020 by Ethos Technologies

Businessman holding a clear tablet with a floating lock symbol in the air above it

How Do You Quantify the Real-Life Protection and Efficiency Benefits of Your Cyber Security System? Choosing a cyber defense firm for your threat protection can seem like a daunting task. How do I know what I need, how do I know if I’m being proactive...

Read Full Story »

Posted in: Cyber Security

Why Cyber Insurance Is Necessary

June 30th, 2020 by Ethos Technologies

A outstretched finger reaching for a holographic display that is displaying a shield with a padlock icon on it to represent cyber insurance.

Filing and Smiling When is the last time that you filed a piece of paper? It used to be that a file cabinet was like your personal bank vault – holding the papers that defined and valued a business. From employee records to bank statements, that file...

Read Full Story »

Posted in: Cyber Security

HIPAA Compliance & Cybersecurity

June 24th, 2020 by Ethos Technologies

A doctor reaching out and touching the word 'HIPAA' in a hexagon that is connected to other hexagons that have healthcare-related icons in them.

HIPAA Compliance & Cybersecurity If your organization is following all of the rules that are created by both federal and statewide regulations, you are likely compliant to those respective requirements and may fall under the false impression that you...

Read Full Story »

Posted in: Cyber Security

The Real Cost of Cyber Crime

June 17th, 2020 by Ethos Technologies

An outstretched finger touching a digital hologram on screen that is displaying a padlock icon, charts, and data to represent the cost of cybercrime.

What Happens If Your Computer Systems Are Hacked with Ransomware? I think I’m covered by my insurance policy for that…(pause)…you scramble and try to find your policy documentation. It’s here somewhere. I’m sure I’m covered…I mean, I think we’re covered....

Read Full Story »

Posted in: Cyber Security

What Is Your Personal Information Worth on the Dark Web?

June 12th, 2020 by Ethos Technologies

A  hacker whose face is obscured by a hoodie, using a graphic user interface to take personal information to sell on the dark web.

The dark web is often known for the illegal activities conducted there, and while not everything on the dark web is illegal, it’s most appealing factor is its anonymity. The dark web is often a place where stolen data and personal information is bought...

Read Full Story »

Posted in: Cyber Security

A New Approach to Healthcare Cyber Security

June 7th, 2020 by Ethos Technologies

Closeup of a doctor sitting at a table  typing on a device, with multiple charts, icons, and graphics being displayed to represent healthcare cyber security.

A New Approach to an Old Problem Resistance to yet another government regulation, a lack of understanding the complexities of the rules, and an overall unwillingness to take on yet another area of expertise in an ever-changing technical landscape can...

Read Full Story »

Posted in: Cyber Security

Security Awareness Training – Time to Get On Board

June 3rd, 2020 by Ethos Technologies

People in business attire sitting at a large table receiving security training, with a padlock graphic surrounded by a circle interposed over the left side of the image.

Human-error; we talk about it all the time, but what exactly do we mean? Human-error occurs when an individual performs a task or does something with an unintended outcome. It’s easy to point the finger at employee’s as being an organization’s weakest...

Read Full Story »

Posted in: Cyber Security

How Your Employees Will Get You Hacked

May 26th, 2020 by Ethos Technologies

Enter your login information on a piece of paper attached to a fishing hook with the user name and password fields filled to symbolize phishing scams.

Breaches are becoming increasingly common as cybercriminals continue to advance their skills and tactics to trick their victims into falling for their scams. While cybercriminals are remaining diligent in their efforts to carry out their attacks, small...

Read Full Story »

Posted in: Cyber Security

How Does the Dark Web Impact Small Businesses?

May 20th, 2020 by Ethos Technologies

A figure with their face obscured with a hoodie, typing on two keyboards with bright orange text related to hacking floating around them.

Identity theft is an unfortunate occurrence that is all too familiar with most business owners, but do those individuals know where the compromised data will end up? Often, these business owners are unaware of the virtual marketplace where stolen data...

Read Full Story »

Posted in: Cyber Security

Cybercriminals Taking Advantage of COVID-19

May 4th, 2020 by Ethos Technologies

A figure with their face obscured standing behind multiple lines of code.

With unprecedented numbers of people working from home, cybercriminals are more prolific than ever. Looking for new updates on the virus, consumers are more likely to fall for phishing, scams, and malware threats. The increase in online ordering and...

Read Full Story »

Posted in: Cyber Security

Interactive Options Essential During Crisis

April 22nd, 2020 by Ethos Technologies

Women Video conferencing with several co-workers while working from her home office.

Social media like Facebook, Twitter, and Instagram make connecting across he globe easier than ever. Instant messaging began to replace phone calls; timeline posts and e-vites became commonplace for events and holidays. Businesses jumped on the opportunity...

Read Full Story »

Posted in: Managed IT Services

Cyber Security - Out, Cyber Defense - In

April 15th, 2020 by Ethos Technologies

A bright red 3D shield over a code, representing cyber security.

Security and defense are often words that are used interchangeably. So let’s start by defining each. Security: the state of being free from danger or threat Defense: the action of defending from or resisting attack The key difference, ACTION. ...

Read Full Story »

Posted in: Cyber Security

Remote Help Desk vs. Onsite Assistance

April 7th, 2020 by Ethos Technologies

Ethos Help Desk Level 1 and 2 support

We all are accustomed to calling our office IT department, a competent person showing up to our workstations, taking a seat, and a few minutes later we’re all fixed and back to work. Occasionally an escalation occurs and the process may take a bit longer...

Read Full Story »

Posted in: Managed IT Services

Remote Work During COVID-19

April 2nd, 2020 by Ethos Technologies

Women working remotely on her laptop and phone while reviewing papers in her kitchen.

With the rise in cases of COVID-19 throughout the U.S. more and more employers are utilizing a completely remote workforce. Many parts of the country are already in lockdown with more area likely to follow suit. Schools in our state have been doing online...

Read Full Story »

Posted in: Managed IT Services

Benefits of Using a Managed Services Provider for Your IT Needs

March 31st, 2020 by Ethos Technologies

Close up of a person using a stylus to draw on a transparent screen that is covered in charts and graphs.

Small and medium sized businesses often times have IT departments that are stretched thin and operating with limited resources. This means updates, network management, and security can fall behind, leaving data at risk. Managed IT, or Managed Services...

Read Full Story »

Posted in: Managed IT Services

We Will Handle the Technology, You Focus on Business

January 8th, 2020 by Ethos Technologies

Man in a suit reaching out and touching a 2D graphic of lines and dots that is connected to several icons related to IT solutions.

Our fully-managed IT solutions suite is designed to provide you with peace of mind, freeing you to focus on driving your business forward. We monitor your systems, apply patches, protect against viruses, ensure backups are performing successfully, and...

Read Full Story »

Posted in: Managed IT Services