As always Dan helps pull a rabbit out of a hat. We have battled with this server for a month and he was able to resolve the issue for us. Great work!
And some are even attacking our mobile devices.
The Inquirer uncovered a list of the largest malware attacks, and we’ve provided the best ways to avoid threats to everyday devices and platforms for the future:
Attack Medium: Email
This class of attacks started back in 2013. Since then, similar attacks like CryptoWall and TorrentLocker have spawned and cost victims millions of dollars. Through email attachments, CryptoLocker spread and compromised network drives through RSA public-key cryptography. Messages from the malware commanded payments within a certain time period to “decrypt data.” The attack caused over $3 million in total losses to email users.
How to avoid attacks to email accounts
Attack Medium: Mobile Devices
How to avoid attacks to mobile devices
Attack Medium: Computers
It took the creation of an entirely new algorithm to defeat this vicious threat to Windows operating systems. The attack compromised low-level disk structures by embedding them with an encrypted kernel. The malware dug deep enough into computers to hinder the ability to boot their Windows desktops. Like CryptoLocker and its spawns, this attack also distributes messages to users to release the attack.
How to avoid attacks to your computer
Note: Your firewall/virus protection software should be the only source delivering messages about threats to your computer.
And of course, the best way to avoid attacks on your devices is to create a strong security strategy with OSG’s experienced IT professionals.