• Construction
    • Tech Support
      • Managed Services
      • Supplemental Staffing
      • Cloud Services
      • IT Office Infrastructure
    • Phone Systems Integration
      • Phone Services
      • Dream of the Single Screen
      • How Much Will This Cost?
    • Cybersecurity
      • Enhanced Cybersecurity
      • How much will this cost?
      • Security Awareness Training
    • AI Systems Integration
      • Align AI with Business Goals
      • Case studies
      • Resources
  • Nonprofits
    • Tech Support
      • Managed Services
      • Supplemental Staffing
      • Cloud Services
    • Database Consulting
      • Meet Our Director
      • Virtual Database Administrator (vDBA)
      • Data Analytics
      • Custom Querying and Reporting
      • Data Conversions and Migrations
      • Process Automation
      • Personalized Training
    • Phone Systems Integration
      • Phone Service
      • Dream of the Single Screen
      • App Fatigue
    • Cybersecurity
      • Enhanced Cybersecurity
      • How much will this cost?
      • Security Awareness Training
    • AI Systems Integration
      • Align AI with Your Mission
      • Case Studies
      • Resources
  • About Us
    • Our Promise, Your Trust
    • Operational Maturity
      • Big Leaks
      • Small Leaks
    • Mission Statement
    • Code of Conduct
    • Blog
    • Resources
    • Referrals
    • Careers
      • Job Openings
  • Resources
  • Contact Us
  • (201) 479-4989
  • Construction
    • Tech Support
      • Managed Services
      • Supplemental Staffing
      • Cloud Services
      • IT Office Infrastructure
    • Phone Systems Integration
      • Phone Services
      • Dream of the Single Screen
      • How Much Will This Cost?
    • Cybersecurity
      • Enhanced Cybersecurity
      • How much will this cost?
      • Security Awareness Training
    • AI Systems Integration
      • Align AI with Business Goals
      • Case studies
      • Resources
  • Nonprofits
    • Tech Support
      • Managed Services
      • Supplemental Staffing
      • Cloud Services
    • Database Consulting
      • Meet Our Director
      • Virtual Database Administrator (vDBA)
      • Data Analytics
      • Custom Querying and Reporting
      • Data Conversions and Migrations
      • Process Automation
      • Personalized Training
    • Phone Systems Integration
      • Phone Service
      • Dream of the Single Screen
      • App Fatigue
    • Cybersecurity
      • Enhanced Cybersecurity
      • How much will this cost?
      • Security Awareness Training
    • AI Systems Integration
      • Align AI with Your Mission
      • Case Studies
      • Resources
  • About Us
    • Our Promise, Your Trust
    • Operational Maturity
      • Big Leaks
      • Small Leaks
    • Mission Statement
    • Code of Conduct
    • Blog
    • Resources
    • Referrals
    • Careers
      • Job Openings
  • Resources
  • Contact Us
  • (201) 479-4989

New Locky ransomware: what you need to know

August 30th, 2017 F8 Consulting Security 2017august30security_a, locky, malware, ransomware, security, trojan
New Locky ransomware: what you need to know

In 2016, the Locky ransomware infected millions of users with a Microsoft Word file. It was eventually contained, and cyber security firms have since created protections to detect and block previous Locky variants. However, a similar malware is currently spreading worldwide and has so far infected tens of thousands of computers.

Read more

Email Newsletter

Blog Subscription

Recent Posts

  • The Hidden Factor That Can Make or Break Your Business
  • Mobile Phone Security: Top Tips for Keeping your Phone Secure
  • Make the most of your threat intelligence platform by following these tips
  • Guest Wi-Fi: Protect Your Network with a Separate Guest Wi-Fi
  • Logging Out: Always Log Out Before Closing Your Browser

Categories

Archives

Contact Us
  • Youtube
  • LinkedIn
  • (201) 479-4989