<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=259493914477262&amp;ev=PageView&amp;noscript=1">

Tabush Group's Cloud & Managed IT Blog

Get Your Head in the Cloud

Cloud is increasingly becoming popular as more companies have noticed the benefits it offers, such as reliability and security. Cloud provides companies flexibility and, when implemented correctly, cloud can increase the efficiency of your business. However, while there are many benefits of the cloud, it also comes with a few risks.

Topics: IT Cybersecurity IT Best Practices Cyber Attacks Phishing Ransomware

What You Need To Know About Cyber Insurance

Cyberattacks are not a new phenomenon.  They have become an increasingly large problem for all organizations, and now, businesses are turning to cyber insurance as a means of protection against the aftermath of a cyberattack.

Topics: IT Cybersecurity IT Best Practices Cyber Attacks Phishing Ransomware

Your Inactive Accounts May Lead to Ransomware Attacks

Cybercriminals often use phishing emails and other security breaches to break into a business’s network but some companies overlook one area in a business when it comes to ransomware attacks: inactive accounts. Cybercriminals leverage inactive or ghost staff accounts to enter a company’s network when businesses do not maintain their databases.

Topics: IT Security Cybersecurity Cyber Attacks

Ransomware Attacks Are Getting Worse

Ransomware is not a new phenomenon but for cybercriminals it has become a popular technique to use.  In a ransomware attack, cybercriminals block access to a business or individual’s computer system and hold data hostage until a ransom is paid.  Here, cybercriminals have just one goal - to receive payment from the victim.  Even if the victim is able to pay the ransom, there is no guarantee the criminal will provide the decryption key to release the data.

Recently, ransomware attacks have become significant threats to corporations, cities, and even nations.  In the third quarter of 2019, the average ransomware payout increased to $41,000, a 13% increase from the second quarter.  Also in 2019, 55% of SMBs paid cybercriminals to recover their stolen data.  If nothing else, 2019 proved that ransomware is still a profitable business for cybercriminals and it will continue to get worse.

Topics: Cybersecurity Cyber Attacks Ransomware

The Rising Popularity of Office 365 Among Cybercriminals

Microsoft Office 365 is growing in popularity as one of the most professional and functional cloud software suites available.  Microsoft estimates it is now being used by 1 in 5 business users, putting this cloud-based service on the radar of cybercriminals.  The greatest popularity of Office 365 resides in the financial and professional services and manufacturing sectors, which are rich with potential plunder for these criminals.

Topics: Cybersecurity Cyber Attacks Office 365

This Can Happen to You, Too. Are You Ready?

Last week it was revealed that Arizona Beverages, a large beverage supplier in the US, experienced a massive ransomware attack in March.  Weeks later, the company is still struggling to recover from this attack.

Topics: Cybersecurity Cyber Attacks

Sitting Ducks: What You Can Do to Protect Yourself from the Next Cyberattack

Not long ago I read, “The Untold Story of NotPetya, the Most Devastating Cyberattack in History,” an eye-opening article on Wired about a massive cyberattack that happened roughly a year ago in 2017. If you have 15 minutes, I highly recommend reading it. If you don't, then allow me to summarize: In 2017, NotPetya malware infected large companies such as Merck, Maersk, and others (companies with huge IT teams and thousands of employees), and literally brought their entire operations to a grinding halt for days, if not weeks, costing them upwards of $300 million in damages per company.

Topics: Cybersecurity IT Best Practices Boxtop Cyber Attacks

10 Simple Ways to Protect Your Business from a Cyber Attack

Small businesses, especially law and accounting firms that deal with sensitive data and financial transactions need to be concerned about cybersecurity. Cyber attacks are becoming more sophisticated and more rampant every day. Luckily, there are some very important – and often inexpensive – things every organization can do to protect themselves.

Topics: Cybersecurity IT Best Practices Cyber Attacks