5 Tips to Fight Back Against Ransomware

 
Did you know that October is National Cyber Security Awareness Month (NCSAM), both in the United States and Europe? What is it, you ask? NCSAM is a public awareness campaign that inspires businesses and individuals to take proactive measures to protect themselves from cyber threats. As the largest network cyber security vendor globally, Check Point is committed to promoting cybersecurity awareness to help organizations more effectively protect themselves. In celebration of the month, we will be posting a series of blogs that provide you with helpful tips and information to assist you in keeping your organization safeguarded from today’s cyber threats. This blog is the first in our series, ...

Great Crypto Failures – When Malware Goes Wrong

 
Yesterday at the Virus Bulletin conference in Denver, Check Point researchers Yaniv Balmas and Ben Herzog presented “Great Crypto Failures”, a lecture about the cryptography mishaps made by cyber criminals. Cryptography is a major part of many malware functionalities today. It’s used to disguise malware, allow it to bypass security measures, create a communication channel with Command and Control (C&C) servers, and lately, to extort victims. While encryption is growing more prominent in malware’s operation, not all writers succeed in their efforts to employ it. Encryption errors can happen to experienced and meticulous developers - let alone amateurish malware writers. This ...

The Cloud: Rethinking IT Security Roles

 
Whether you lead a team of IT professionals—or are the team—tasks like swapping power supplies and tinkering with the datacenter’s air conditioning are quickly transitioning to people in cloud-computing centers. Cisco estimates 83 percent of data center traffic will become cloud traffic by 2019. Moving to the cloud is a significant change from static hardware-based infrastructures to application-centric infrastructures running on dynamic pools of compute and storage resources. The changeover to cloud computing makes this a good time to rethink the security strategy needed to protect your organization’s cloud assets and services as well as what this means for your role as an IT ...