Sophisticated and destructive cyberattacks show no sign of subsiding in 2024. Is your company equipped if you get hit with an attack tomorrow? Bad actors that deploy ransomware are indiscriminate...
Read More
RenovoData was featured in the 3PL Perspectives publication (June 2022 Edition) with this article: "Fight Ransomware with Cyber Resiliency". 3PL Perspectives is a third-party logistics magazine provided by the Transportation Intermediaries Association....
Read More
Don't pay ransomware. Have a recovery plan. Once ransomware infects a network, it contaminates all the data it accesses, including system files and backup storage. Attacks like this quickly become...
Read More
In September 2017, the Logistics Journal ran an article, written by RenovoData. The article provides expert-level detail on Ransomware as a service (RaaS) and how it can affect 3PL and...
Read More
New do-it-yourself cyber-extortion kits make it easy. Since its invention in the mid-2000s, ransomware has become the world’s premier cyber-security threat. Typically gaining entry to a system via bogus emails...
Read More
In July, RenovoData again was featured in the leading publication of the Transport Intermediaries Association, The Logistics Journal. The article, written by our own Chuck Cook, provides critical and detailed...
Read More
A sophisticated new generation of ransomware is rolling across North America. It doesn’t just steal your information and wreak havoc with your IT systems. It steals your money. Several versions of ransomware...
Read More
The objective of ransomware is simple: using invasive encryption to extort money by holding an organization’s network and data hostage. But ransomware technology is far from simple, and it can...
Read More
Back in February 2016, it was reported that Hollywood Presbyterian Hospital had become the latest high-profile victim of a cyber-attack. Hackers had gained control of the hospital’s network and encrypted...
Read More
New Breeds of Ransomware... Last year, the FBI in the United States, and other authorities worldwide, took down the infrastructure used to distribute CryptoLocker—thereby disrupting the effectiveness of the malware....
Read More