The Kaseya Ransomware Attack, the Supply-Chain Threat, and What You Can Do

There has been a lot of news and some speculation about the ransomware attack on the Kaseya VSA software.  Here’s what’s happened so far. Cybercriminals exploited several vulnerabilities on Kaseya’s VSA on-premises product to attempt to install ransomware onto computers and servers managed by the Kaseya VSA. IT departments and MSPs use the VSA software …

Read more

How To Qualify for Cyber Insurance As Claims Skyrocket

More risk means tighter qualifications and higher premiums when it comes to insurance — cyber insurance is no different. The past few years have seen enormous increases in cybercrime and, not surprisingly, skyrocketing claims. “Policyholders can expect 20% to 50% rate increases for cyber coverage throughout 2021 as trends that began last year continue at …

Read more

Is Your Organization Ransomware-Ready?

(UPDATED 5/12/21) Ransomware is a gold mine for cybercriminals. It’s available on the dark web as-a-service, most businesses aren’t fully prepared to defend against it, and it can be monetized beyond the ransom demand by selling stolen data and using “name and shame” schemes. It’s no wonder we’re seeing an enormous spike — criminals are …

Read more

The 2 Most Important Actions To Take After The SolarWinds Hack

We posed a series of questions to Leapfrog Services CTO Emmett Hawkins about what companies should do to improve their security posture after the SolarWinds hack. To recap what happened, late in 2020, a leading cybersecurity company named FireEye discovered it had been hacked and identified SolarWinds network-monitoring software as the source of the hack. …

Read more

Third-party Vendors Risk: 6 Steps To Protect Your Business

(UPDATED) One of the most important things we’ve learned from the SolarWinds hack is organizations need to include all software and apps in their inventories of third-party vendors. Historically, third-party vendors have been a primary risk when it comes to data breaches — they’re often the weakest link in the chain of protection. Third-party vendors …

Read more

5 Cybersecurity Must-Haves During COVID-19: Check the Box

With everything going on during the pandemic, focusing on cybersecurity is often taking a back seat and bad actors are taking advantage of it. More phishing scams, ransomware in coronavirus-related apps, attacks on healthcare and research facilities — cybercriminals thrive on the chaos. Networks with the least protection are the most vulnerable. Leapfrog recommends that …

Read more

Phishing Scams Are Skyrocketing – What Companies Should Do

Phishing scams were up as much as 667% by the end of March, with most scams targeting personal email accounts. By April 22, Google reported having detected 18 million COVID-19 malware and phishing Gmail messages per day.  Scammers are taking full advantage of fear, distraction, and disorientation right now. Fraudsters know you’re at home using your …

Read more

MFA During COVID-19: Eight Ways To Be More Secure

Multifactor authentication (MFA) is more important than ever when everyone is working remotely — no more walking down the hall to ask a question. This is a massive change for most organizations. It’s critical to take steps to verify identities before allowing access to your network or data. As a reminder, MFA consists of three …

Read more

Someone Stole My Company Laptop! Now What?

When your company laptop goes missing, it’s time to leap into action! Whether it was stolen from your car, disappeared in the airport security line, or was physically wrenched from your hands in a grab-and-run, these seven steps apply: 1. Call your IT department or your company IT service provider. They need to know as …

Read more

How Can We Help?
close slider