<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Ransomware Archives - L2 Cyber Security Solutions Ltd.</title>
	<atom:link href="https://www.l2cybersecurity.com/tag/ransomware/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.l2cybersecurity.com/tag/ransomware/</link>
	<description>#SecuritySimplified</description>
	<lastBuildDate>Thu, 01 Aug 2024 15:12:49 +0000</lastBuildDate>
	<language>en-GB</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://www.l2cybersecurity.com/wp-content/uploads/2023/03/cropped-Logo-Only-Favicon-Transparent-32x32.png</url>
	<title>Ransomware Archives - L2 Cyber Security Solutions Ltd.</title>
	<link>https://www.l2cybersecurity.com/tag/ransomware/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>#WeekendWisdom 092 Encryption</title>
		<link>https://www.l2cybersecurity.com/weekendwisdom-092-encryption/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Fri, 27 Aug 2021 07:15:24 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[#SecuritySimplified]]></category>
		<category><![CDATA[#WeekendWisdom]]></category>
		<category><![CDATA[Ciphertext]]></category>
		<category><![CDATA[Clare]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Decrypt]]></category>
		<category><![CDATA[Encrypt]]></category>
		<category><![CDATA[Encryption]]></category>
		<category><![CDATA[Limerick]]></category>
		<category><![CDATA[Plaintext]]></category>
		<category><![CDATA[Ransomware]]></category>
		<category><![CDATA[Tipperary]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=2592</guid>

					<description><![CDATA[<p>Welcome to #WeekendWisdom number 92. This week we&#8217;re going to talk about Encryption. Where did this story start? A few weeks ago, I was talking to some people about my favourite topic #Ransomware and I was explaining how ransomware goes through the process of encryption of all the data files that they can see. Somebody&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/weekendwisdom-092-encryption/">#WeekendWisdom 092 Encryption</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Welcome to #WeekendWisdom number 92. This week we&#8217;re going to talk about Encryption.<span id="more-2592"></span></p>
<div style="width: 1920px;" class="wp-video"><video class="wp-video-shortcode" id="video-2592-1" width="1920" height="1080" preload="metadata" controls="controls"><source type="video/mp4" src="https://www.l2cybersecurity.com/wp-content/uploads/2021/08/WeekendWisdom-092-lo.mp4?_=1" /><a href="https://www.l2cybersecurity.com/wp-content/uploads/2021/08/WeekendWisdom-092-lo.mp4">https://www.l2cybersecurity.com/wp-content/uploads/2021/08/WeekendWisdom-092-lo.mp4</a></video></div>
<h3>Where did this story start?</h3>
<p>A few weeks ago, I was talking to some people about my favourite topic #Ransomware and I was explaining how ransomware goes through the process of encryption of all the data files that they can see. Somebody stopped me and asked me, what do I mean by encryption?</p>
<p>I was kinda surprised that the word wasn&#8217;t really better known out there, maybe its because of the industry I&#8217;m in.</p>
<h3>What is Encryption?</h3>
<p>Encryption at it&#8217;s most basic form is the scrambling of a set of data in conjunction with some kind of a key that will scramble the data make it unusable, you won&#8217;t understand what it is, unless you have the key which, whoever receives the data, they have the key, they can decrypt the data. Get it back to something that looks normal.</p>
<h3>How does it work?</h3>
<p>So what we talk about in the information security business:</p>
<ol>
<li>you take <span style="text-decoration: underline;"><strong>plaintext</strong></span>, which is the stuff that you can read.</li>
<li>you apply the key to it, which generates <span style="text-decoration: underline;"><strong>ciphertext</strong></span>, which is what&#8217;s transmitted.</li>
<li>Anybody that gets the <span style="text-decoration: underline;"><strong>ciphertext</strong></span>, they won&#8217;t be able to understand it.</li>
<li>When it gets to the other side, the person uses the key and it decrypts the data and they get back to <span style="text-decoration: underline;"><strong>plaintext</strong></span>.</li>
</ol>
<h3>All very modern sounding.</h3>
<p>This has been around for since ancient times. There was apparently some encryption found in some tomb in Egypt from like 1900 BC. So Encryption has been around a long time. It&#8217;s not just something new with computers.</p>
<p>So that’s it for this week. Lets be careful out there and we’ll talk to you again next week.</p>
<div class="fl-post-content clearfix">
<hr />
<h2>How can L2 Cyber Security help you?</h2>
<p>We offer a full range of <a href="https://www.l2cybersecurity.com/training" target="_blank" rel="noopener noreferrer">training programmes</a>, which can be delivered online or in-person<strong>*</strong>.</p>
<p>Contact us for more information at <a href="mailto:info@L2CyberSecurity.com" target="_blank" rel="noopener noreferrer">info@L2CyberSecurity.com</a>.</p>
<p><strong>*</strong>With appropriate social distancing and other health and safety measures adhered to.</p>
<hr />
<h2>Follow us on Social media:</h2>
<p>Liam is available on <a href="https://www.linkedin.com/in/l2actual/" target="_blank" rel="noopener noreferrer">LinkedIn</a> and <a href="https://infosec.exchange/@L2actual" target="_blank" rel="noopener">Mastodon</a>.</p>
<p>Follow L2 Cyber on <a href="https://www.linkedin.com/company/l2cyber/" target="_blank" rel="noopener noreferrer">LinkedIn</a>.</p>
<p><a href="https://www.l2cybersecurity.com/" target="_blank" rel="noopener noreferrer">© L2 Cyber Security Solutions</a></p>
</div>
<p>The post <a href="https://www.l2cybersecurity.com/weekendwisdom-092-encryption/">#WeekendWisdom 092 Encryption</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		<enclosure url="https://www.l2cybersecurity.com/wp-content/uploads/2021/08/WeekendWisdom-092-lo.mp4" length="31787103" type="video/mp4" />

			</item>
		<item>
		<title>#WeekendWisdom 086 Supply Chain Hacks</title>
		<link>https://www.l2cybersecurity.com/weekendwisdom-086-supply-chain-hacks/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Fri, 09 Jul 2021 01:15:58 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[#SecuritySimplified]]></category>
		<category><![CDATA[#WeekendWisdom]]></category>
		<category><![CDATA[Clare]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Due Diligence]]></category>
		<category><![CDATA[Independent Assessment]]></category>
		<category><![CDATA[Kaseya]]></category>
		<category><![CDATA[Kaseya Hack]]></category>
		<category><![CDATA[Limerick]]></category>
		<category><![CDATA[Ransomware]]></category>
		<category><![CDATA[REvil]]></category>
		<category><![CDATA[REvil Ransomware]]></category>
		<category><![CDATA[Sodinokibi]]></category>
		<category><![CDATA[SolarWinds]]></category>
		<category><![CDATA[SolarWinds Hack]]></category>
		<category><![CDATA[Supply Chain]]></category>
		<category><![CDATA[Supply Chain Hacks]]></category>
		<category><![CDATA[Supply Chain Risk]]></category>
		<category><![CDATA[Tipperary]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=2564</guid>

					<description><![CDATA[<p>Welcome to #WeekendWisdom number 86. This week were going to talk about Supply Chain Hacks. This sounds familiar Back in #WeekendWisdom number 41, I talked about supply chain risks. Since then there have been a couple of massive global supply chain hacks that have occurred. What are these supply chain hacks you speak of? The&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/weekendwisdom-086-supply-chain-hacks/">#WeekendWisdom 086 Supply Chain Hacks</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Welcome to #WeekendWisdom number 86. This week were going to talk about Supply Chain Hacks.<span id="more-2564"></span></p>
<div style="width: 1920px;" class="wp-video"><video class="wp-video-shortcode" id="video-2564-2" width="1920" height="1080" preload="metadata" controls="controls"><source type="video/mp4" src="https://www.l2cybersecurity.com/wp-content/uploads/2021/07/WeekendWisdom-086-lo.mp4?_=2" /><a href="https://www.l2cybersecurity.com/wp-content/uploads/2021/07/WeekendWisdom-086-lo.mp4">https://www.l2cybersecurity.com/wp-content/uploads/2021/07/WeekendWisdom-086-lo.mp4</a></video></div>
<h3>This sounds familiar</h3>
<p>Back in <a href="https://www.l2cybersecurity.com/weekendwisdom-041-supply-chain-risk/" target="_blank" rel="noopener">#WeekendWisdom number 41</a>, I talked about supply chain risks. Since then there have been a couple of massive global supply chain hacks that have occurred.</p>
<h3>What are these supply chain hacks you speak of?</h3>
<p>The first one was late last year. The SolarWinds hack was revealed. SolarWinds makes network monitoring software that are used by large corporates and government agencies.</p>
<p>But for my audience, which will be the more smaller business owner, something happened last week. A company called Kaseya, they provide software for IT managed service providers who obviously look after the IT for their customers which are usually small businesses. This software enables those managed service providers to be able to remotely manage and control their client&#8217;s devices.</p>
<h3>What happened with the Kaseya hack?</h3>
<p>Well Kaseya were hacked and had their client&#8217;s devices were ransomed by the REvil ransomware gang. Now REvil claim that they have infected a million devices around the globe and they&#8217;re looking for $70 million to free up these devices. The whole story is still playing out, so we don&#8217;t know the full details of it yet.</p>
<h3>What can you do about this type of risk?</h3>
<p>But how would you, as a small business owner, be able to try and protect yourself from such a supply chain hack?</p>
<p>Well you really do need to make sure that any third party that is going to put some kind of service or device or software into your network, into your environment, to carry out a full, thorough due diligence on that supplier and their application.</p>
<p>If you don&#8217;t have the capability in-house, there&#8217;s plenty of people out there in the market and in the business that will be able to provide you with an independent assessment.</p>
<p>So that’s it for this week. Lets be careful out there and we’ll talk to you again next week.</p>
<div class="fl-post-content clearfix">
<hr />
<h2>How can L2 Cyber Security help you?</h2>
<p>We offer a full range of <a href="https://www.l2cybersecurity.com/training" target="_blank" rel="noopener noreferrer">training programmes</a>, which can be delivered online or in-person<strong>*</strong>.</p>
<p>L2 Cyber Security are also a partner of <a href="https://www.cyberriskaware.com/" target="_blank" rel="noopener noreferrer">CyberRiskAware</a> for online self-directed Cyber Security Awareness training and Phishing testing.</p>
<p>Contact us for more information at <a href="mailto:info@L2CyberSecurity.com" target="_blank" rel="noopener noreferrer">info@L2CyberSecurity.com</a>.</p>
<p><strong>*</strong>With appropriate social distancing and other health and safety measures adhered to.</p>
<hr />
<h2>Follow us on Social media:</h2>
<p>Liam is available on <a href="https://twitter.com/L2actual" target="_blank" rel="noopener noreferrer">Twitter</a>, <a href="https://www.linkedin.com/in/lynchliam/" target="_blank" rel="noopener noreferrer">LinkedIn</a> and <a href="https://www.instagram.com/l2actual/" target="_blank" rel="noopener noreferrer">Instagram</a>.</p>
<p>Follow L2 Cyber on <a href="https://twitter.com/L2Cyber" target="_blank" rel="noopener noreferrer">Twitter</a>, <a href="https://www.linkedin.com/company/l2cyber/" target="_blank" rel="noopener noreferrer">LinkedIn</a>, <a href="https://www.instagram.com/l2cyber/" target="_blank" rel="noopener noreferrer">Instagram</a> and <a href="https://www.facebook.com/L2Cyber/" target="_blank" rel="noopener noreferrer">Facebook</a>.</p>
<p><a href="https://www.l2cybersecurity.com/" target="_blank" rel="noopener noreferrer">© L2 Cyber Security Solutions</a></p>
</div>
<p>The post <a href="https://www.l2cybersecurity.com/weekendwisdom-086-supply-chain-hacks/">#WeekendWisdom 086 Supply Chain Hacks</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		<enclosure url="https://www.l2cybersecurity.com/wp-content/uploads/2021/07/WeekendWisdom-086-lo.mp4" length="37504000" type="video/mp4" />

			</item>
		<item>
		<title>#WeekendWisdom 084 Distributed Denial of Service Attacks</title>
		<link>https://www.l2cybersecurity.com/weekendwisdom-084-distributed-denial-of-service-attacks/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Fri, 25 Jun 2021 01:15:17 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[#SecuritySimplified]]></category>
		<category><![CDATA[#WeekendWisdom]]></category>
		<category><![CDATA[Botnet]]></category>
		<category><![CDATA[Bots]]></category>
		<category><![CDATA[Clare]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[DDOS]]></category>
		<category><![CDATA[Denial of Service]]></category>
		<category><![CDATA[Denial of Service Attacks]]></category>
		<category><![CDATA[Distributed Denial of Service]]></category>
		<category><![CDATA[Distributed Denial of Service Attacks]]></category>
		<category><![CDATA[DOS]]></category>
		<category><![CDATA[Limerick]]></category>
		<category><![CDATA[Ransomware]]></category>
		<category><![CDATA[Tipperary]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=2551</guid>

					<description><![CDATA[<p>Welcome to #WeekendWisdom number 84. This week we&#8217;re going to talk about Distributed Denial of Service Attacks. What are distributed denial of service attacks? A denial of service attack is where a bad actor will use some thing to deny you access to some other service. So for example, a ransomware incident, is where the&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/weekendwisdom-084-distributed-denial-of-service-attacks/">#WeekendWisdom 084 Distributed Denial of Service Attacks</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Welcome to #WeekendWisdom number 84. This week we&#8217;re going to talk about Distributed Denial of Service Attacks.<span id="more-2551"></span></p>
<div style="width: 1920px;" class="wp-video"><video class="wp-video-shortcode" id="video-2551-3" width="1920" height="1080" preload="metadata" controls="controls"><source type="video/mp4" src="https://www.l2cybersecurity.com/wp-content/uploads/2021/06/WeekendWisdom-084-lo.mp4?_=3" /><a href="https://www.l2cybersecurity.com/wp-content/uploads/2021/06/WeekendWisdom-084-lo.mp4">https://www.l2cybersecurity.com/wp-content/uploads/2021/06/WeekendWisdom-084-lo.mp4</a></video></div>
<h3>What are distributed denial of service attacks?</h3>
<p>A denial of service attack is where a bad actor will use some thing to deny you access to some other service. So for example, a ransomware incident, is where the criminals, they are using ransomware to deny you access to the service of your computers.</p>
<p>A distributed denial of service attack is slightly different in that the criminals are going to use many, many, many thousands of devices that they control that are called bots and they&#8217;re all in this kind of thing that they call a botnet.</p>
<h3>What can a botnet do?</h3>
<p>It is then used to target an online service or application that your business depends on. Thus they flood it with requests which therefore then drowns out any legitimate requests that you&#8217;re trying to put there to make use of that service.</p>
<h3>So how can you prevent this type of thing?</h3>
<p>Well usually your internet service provider or your application service provider may have some facilities that they can use that control these type of distributed denial of service attacks. So you should contact them if you are in such a situation. It costs money but it&#8217;s well worth it if you want to get access back to your online service.</p>
<p>You can refer back to <a href="https://www.l2cybersecurity.com/weekendwisdom-076-connecting-devices-to-the-internet/" target="_blank" rel="noopener">#WeekendWisdom number 76</a> where I talked about connecting cheap devices to the internet which don&#8217;t have really good security on them and these are usually the devices that make up these botnets.</p>
<p>So that’s it for this week. Lets be careful out there and we’ll talk to you again next week.</p>
<div class="fl-post-content clearfix">
<hr />
<h2>How can L2 Cyber Security help you?</h2>
<p>We offer a full range of <a href="https://www.l2cybersecurity.com/training" target="_blank" rel="noopener noreferrer">training programmes</a>, which can be delivered online or in-person<strong>*</strong>.</p>
<p>L2 Cyber Security are also a partner of <a href="https://www.cyberriskaware.com/" target="_blank" rel="noopener noreferrer">CyberRiskAware</a> for online self-directed Cyber Security Awareness training and Phishing testing.</p>
<p>Contact us for more information at <a href="mailto:info@L2CyberSecurity.com" target="_blank" rel="noopener noreferrer">info@L2CyberSecurity.com</a>.</p>
<p><strong>*</strong>With appropriate social distancing and other health and safety measures adhered to.</p>
<hr />
<h2>Follow us on Social media:</h2>
<p>Liam is available on <a href="https://twitter.com/L2actual" target="_blank" rel="noopener noreferrer">Twitter</a>, <a href="https://www.linkedin.com/in/lynchliam/" target="_blank" rel="noopener noreferrer">LinkedIn</a> and <a href="https://www.instagram.com/l2actual/" target="_blank" rel="noopener noreferrer">Instagram</a>.</p>
<p>Follow L2 Cyber on <a href="https://twitter.com/L2Cyber" target="_blank" rel="noopener noreferrer">Twitter</a>, <a href="https://www.linkedin.com/company/l2cyber/" target="_blank" rel="noopener noreferrer">LinkedIn</a>, <a href="https://www.instagram.com/l2cyber/" target="_blank" rel="noopener noreferrer">Instagram</a> and <a href="https://www.facebook.com/L2Cyber/" target="_blank" rel="noopener noreferrer">Facebook</a>.</p>
<p><a href="https://www.l2cybersecurity.com/" target="_blank" rel="noopener noreferrer">© L2 Cyber Security Solutions</a></p>
</div>
<p>The post <a href="https://www.l2cybersecurity.com/weekendwisdom-084-distributed-denial-of-service-attacks/">#WeekendWisdom 084 Distributed Denial of Service Attacks</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		<enclosure url="https://www.l2cybersecurity.com/wp-content/uploads/2021/06/WeekendWisdom-084-lo.mp4" length="32198176" type="video/mp4" />

			</item>
		<item>
		<title>#WeekendWisdom 083 HSE Ransomware Update</title>
		<link>https://www.l2cybersecurity.com/weekendwisdom-083-hse-ransomware-update/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Fri, 18 Jun 2021 01:15:31 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[#SecuritySimplified]]></category>
		<category><![CDATA[#WeekendWisdom]]></category>
		<category><![CDATA[Backup Strategy]]></category>
		<category><![CDATA[Backups]]></category>
		<category><![CDATA[Clare]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Encryption Key]]></category>
		<category><![CDATA[HSE]]></category>
		<category><![CDATA[HSE Ransomware Update]]></category>
		<category><![CDATA[HSE Update]]></category>
		<category><![CDATA[Limerick]]></category>
		<category><![CDATA[Ransomware]]></category>
		<category><![CDATA[Ransomware Incident]]></category>
		<category><![CDATA[Ransomware Key]]></category>
		<category><![CDATA[Ransomware Update]]></category>
		<category><![CDATA[Tipperary]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=2546</guid>

					<description><![CDATA[<p>Welcome to #WeekendWisdom number 83. This week we&#8217;re going to talk about HSE Ransomware Update. This is a quick HSE Ransomware Update At the time of recording, we&#8217;re just one day shy of it being 5 weeks since we learned of the devastating impact of the HSE ransomware incident. To all of those experts that&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/weekendwisdom-083-hse-ransomware-update/">#WeekendWisdom 083 HSE Ransomware Update</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Welcome to #WeekendWisdom number 83. This week we&#8217;re going to talk about HSE Ransomware Update.</p>
<div style="width: 1920px;" class="wp-video"><video class="wp-video-shortcode" id="video-2546-4" width="1920" height="1080" preload="metadata" controls="controls"><source type="video/mp4" src="https://www.l2cybersecurity.com/wp-content/uploads/2021/06/WeekendWisdom-083-lo.mp4?_=4" /><a href="https://www.l2cybersecurity.com/wp-content/uploads/2021/06/WeekendWisdom-083-lo.mp4">https://www.l2cybersecurity.com/wp-content/uploads/2021/06/WeekendWisdom-083-lo.mp4</a></video></div>
<h3>This is a quick HSE Ransomware Update</h3>
<p>At the time of recording, we&#8217;re just one day shy of it being 5 weeks since we learned of the devastating impact of the HSE ransomware incident. To all of those experts that were on TV, Radio, Newspapers and other online media who were saying &#8220;Just pay the ransom and we&#8217;ll get back up and running.&#8221;</p>
<p>Here we are 5 weeks later and they&#8217;re still not back up and running. That&#8217;s even with them getting the key to decrypt the data within 3 days of the incident. So even having the key, it&#8217;s taking them so much longer to recover.</p>
<h3>Why is it taking so long?</h3>
<p>This is because the HSE has huge, vast quantities of data that needs to be checked and made sure the integrity is perfect. Because you don&#8217;t want your health records to be damaged in anyway, do you? I certainly wouldn&#8217;t. So they have to be so very careful with getting the data back.</p>
<h3>What hope does a small business owner have?</h3>
<p>For smaller businesses, which is where more my focus would be, things can be a lot simpler. It can be a lot easier for you to be able to recover from these type of ransomware incidents, if you put in place a decent backup strategy. I am happy to talk to any small business owner that needs any kind of assistance in making sure they have good backups in place.</p>
<p>So that’s it for this week. Lets be careful out there and we’ll talk to you again next week.</p>
<div class="fl-post-content clearfix">
<hr />
<h2>How can L2 Cyber Security help you?</h2>
<p>We offer a full range of <a href="https://www.l2cybersecurity.com/training" target="_blank" rel="noopener noreferrer">training programmes</a>, which can be delivered online or in-person<strong>*</strong>.</p>
<p>L2 Cyber Security are also a partner of <a href="https://www.cyberriskaware.com/" target="_blank" rel="noopener noreferrer">CyberRiskAware</a> for online self-directed Cyber Security Awareness training and Phishing testing.</p>
<p>Contact us for more information at <a href="mailto:info@L2CyberSecurity.com" target="_blank" rel="noopener noreferrer">info@L2CyberSecurity.com</a>.</p>
<p><strong>*</strong>With appropriate social distancing and other health and safety measures adhered to.</p>
<hr />
<h2>Follow us on Social media:</h2>
<p>Liam is available on <a href="https://twitter.com/L2actual" target="_blank" rel="noopener noreferrer">Twitter</a>, <a href="https://www.linkedin.com/in/lynchliam/" target="_blank" rel="noopener noreferrer">LinkedIn</a> and <a href="https://www.instagram.com/l2actual/" target="_blank" rel="noopener noreferrer">Instagram</a>.</p>
<p>Follow L2 Cyber on <a href="https://twitter.com/L2Cyber" target="_blank" rel="noopener noreferrer">Twitter</a>, <a href="https://www.linkedin.com/company/l2cyber/" target="_blank" rel="noopener noreferrer">LinkedIn</a>, <a href="https://www.instagram.com/l2cyber/" target="_blank" rel="noopener noreferrer">Instagram</a> and <a href="https://www.facebook.com/L2Cyber/" target="_blank" rel="noopener noreferrer">Facebook</a>.</p>
<p><a href="https://www.l2cybersecurity.com/" target="_blank" rel="noopener noreferrer">© L2 Cyber Security Solutions</a></p>
</div>
<div class="fl-post-meta fl-post-meta-bottom">
<div class="fl-post-cats-tags">Posted in <a href="https://www.l2cybersecurity.com/category/news/" rel="category tag">News</a> and tagged <a href="https://www.l2cybersecurity.com/tag/securitysimplified/" rel="tag">#SecuritySimplified</a>, <a href="https://www.l2cybersecurity.com/tag/weekendwisdom/" rel="tag">#WeekendWisdom</a>, <a href="https://www.l2cybersecurity.com/tag/cdn/" rel="tag">CDN</a>, <a href="https://www.l2cybersecurity.com/tag/cdn-failure/" rel="tag">CDN Failure</a>, <a href="https://www.l2cybersecurity.com/tag/clare/" rel="tag">Clare</a>, <a href="https://www.l2cybersecurity.com/tag/content-delivery-network/" rel="tag">Content Delivery Network</a>, <a href="https://www.l2cybersecurity.com/tag/cyber-security/" rel="tag">Cyber Security</a>, <a href="https://www.l2cybersecurity.com/tag/fastly/" rel="tag">Fastly</a>, <a href="https://www.l2cybersecurity.com/tag/fastly-cdn/" rel="tag">Fastly CDN</a>, <a href="https://www.l2cybersecurity.com/tag/fastly-failure/" rel="tag">Fastly Failure</a>, <a href="https://www.l2cybersecurity.com/tag/internet-down/" rel="tag">Internet Down</a>, <a href="https://www.l2cybersecurity.com/tag/internet-down-situation/" rel="tag">Internet Down Situation</a>, <a href="https://www.l2cybersecurity.com/tag/limerick/" rel="tag">Limerick</a>, <a href="https://www.l2cybersecurity.com/tag/tipperary/" rel="tag">Tipperary</a></div>
</div>
<p>The post <a href="https://www.l2cybersecurity.com/weekendwisdom-083-hse-ransomware-update/">#WeekendWisdom 083 HSE Ransomware Update</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		<enclosure url="https://www.l2cybersecurity.com/wp-content/uploads/2021/06/WeekendWisdom-083-lo.mp4" length="30406366" type="video/mp4" />

			</item>
		<item>
		<title>Cyber Security Basics Ransomware</title>
		<link>https://www.l2cybersecurity.com/cyber-security-basics-ransomware/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Mon, 17 May 2021 07:00:41 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[#CyberSecurityBasics]]></category>
		<category><![CDATA[#SecuritySimplified]]></category>
		<category><![CDATA[Clare]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cyber Security Basics]]></category>
		<category><![CDATA[Limerick]]></category>
		<category><![CDATA[Ransomware]]></category>
		<category><![CDATA[Tipperary]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=2522</guid>

					<description><![CDATA[<p>This Cyber Security Basics Ransomware post is a short, simple primer for small business owners to understand more about #Ransomware. What is Ransomware? Ransomware is malicious software that will scramble all of the files that it can find on your device, on your network, even in the cloud and it will look for money to&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/cyber-security-basics-ransomware/">Cyber Security Basics Ransomware</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>This Cyber Security Basics Ransomware post is a short, simple primer for small business owners to understand more about #Ransomware.<span id="more-2522"></span></p>
<div style="width: 1920px;" class="wp-video"><video class="wp-video-shortcode" id="video-2522-5" width="1920" height="1080" preload="metadata" controls="controls"><source type="video/mp4" src="https://www.l2cybersecurity.com/wp-content/uploads/2021/05/Cyber-Security-Basics-Ransomware-lo.mp4?_=5" /><a href="https://www.l2cybersecurity.com/wp-content/uploads/2021/05/Cyber-Security-Basics-Ransomware-lo.mp4">https://www.l2cybersecurity.com/wp-content/uploads/2021/05/Cyber-Security-Basics-Ransomware-lo.mp4</a></video></div>
<h3>What is Ransomware?</h3>
<p>Ransomware is malicious software that will scramble all of the files that it can find on your device, on your network, even in the cloud and it will look for money to unscramble the data from you, probably through using some kind of virtual currency like a Bitcoin.</p>
<h3>How does it get in?</h3>
<p>It can get in through a phishing email. Through somebody opening an attachment that contains malicious software or by clicking a link which takes you to a website that can download malicious software. It can also happen outside of your control by the criminals probing at any kind of remote access service that you have on your network. These can be penetrated and if they are, they can get into your network and they will scramble all of your data that they can see and it will also likely steal data from you beforehand and use that as a further leverage to get more money out of you for not revealing that data.</p>
<h3>How can I protect myself?</h3>
<p>It is possible to defend against ransomware by taking these following steps:</p>
<ol>
<li>You should only be using currently supported, up-to-date versions of software.</li>
<li>You should use some kind of anti-virus or anti-malware software.</li>
<li>Your staff should receive regular security awareness training so that they can recognise dodgy emails that will contain links or attachments that could compromise your setup.</li>
<li>You should also make sure that any remote access capabilities that you have is kept fully up-to-date and is well hardened.</li>
</ol>
<h3>How can I prevent having to pay?</h3>
<p>Backups are by far the best way to recover from a ransomware incident. I always recommend that small businesses use the 3-2-1 backup methodology. That is:</p>
<ul>
<li>Having three copies of your data, one copy being your live version</li>
<li>Having two copies on separate media such as an external hard drive or the cloud and</li>
<li>One copy is off-site and one copy is offline</li>
</ul>
<p>It is the offline copy that will help you recover from ransomware.</p>
<p>The other thing with backups is you must test your backups, because you don&#8217;t have a backup until you know it works. So</p>
<p>TEST.</p>
<p>YOUR.</p>
<p>BACKUPS!</p>
<hr />
<h2>How can L2 Cyber Security help you?</h2>
<p>We offer a full range of <a href="https://www.l2cybersecurity.com/training" target="_blank" rel="noopener noreferrer">training programmes</a>, which can be delivered online or in-person<strong>*</strong>.</p>
<p>L2 Cyber Security are also a partner of <a href="https://www.cyberriskaware.com/" target="_blank" rel="noopener noreferrer">CyberRiskAware</a> for online self-directed Cyber Security Awareness training and Phishing testing.</p>
<p>Contact us for more information at <a href="mailto:info@L2CyberSecurity.com" target="_blank" rel="noopener noreferrer">info@L2CyberSecurity.com</a>.</p>
<p><strong>*</strong>With appropriate social distancing and other health and safety measures adhered to.</p>
<hr />
<h2>Follow us on Social media:</h2>
<p>Liam is available on <a href="https://twitter.com/L2actual" target="_blank" rel="noopener noreferrer">Twitter</a>, <a href="https://www.linkedin.com/in/lynchliam/" target="_blank" rel="noopener noreferrer">LinkedIn</a> and <a href="https://www.instagram.com/l2actual/" target="_blank" rel="noopener noreferrer">Instagram</a>.</p>
<p>Follow L2 Cyber on <a href="https://twitter.com/L2Cyber" target="_blank" rel="noopener noreferrer">Twitter</a>, <a href="https://www.linkedin.com/company/l2cyber/" target="_blank" rel="noopener noreferrer">LinkedIn</a>, <a href="https://www.instagram.com/l2cyber/" target="_blank" rel="noopener noreferrer">Instagram</a> and <a href="https://www.facebook.com/L2Cyber/" target="_blank" rel="noopener noreferrer">Facebook</a>.</p>
<p><a href="https://www.l2cybersecurity.com/" target="_blank" rel="noopener noreferrer">© L2 Cyber Security Solutions</a></p>
<p>The post <a href="https://www.l2cybersecurity.com/cyber-security-basics-ransomware/">Cyber Security Basics Ransomware</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		<enclosure url="https://www.l2cybersecurity.com/wp-content/uploads/2021/05/Cyber-Security-Basics-Ransomware-lo.mp4" length="39888275" type="video/mp4" />

			</item>
		<item>
		<title>#WeekendWisdom 078 Dealing with Ransomware</title>
		<link>https://www.l2cybersecurity.com/weekendwisdom-078-dealing-with-ransomware/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Fri, 14 May 2021 01:15:49 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[#SecuritySimplified]]></category>
		<category><![CDATA[#WeekendWisdom]]></category>
		<category><![CDATA[Backups]]></category>
		<category><![CDATA[Clare]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Dealing with Ransomware]]></category>
		<category><![CDATA[Incident Response Plan]]></category>
		<category><![CDATA[Limerick]]></category>
		<category><![CDATA[Ransomware]]></category>
		<category><![CDATA[Ransomware handling]]></category>
		<category><![CDATA[Ransomware mitigation]]></category>
		<category><![CDATA[Tested backups]]></category>
		<category><![CDATA[Tested Incident Response Plan]]></category>
		<category><![CDATA[Tipperary]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=2518</guid>

					<description><![CDATA[<p>Welcome to #WeekendWisdom number 78. This week we&#8217;re going to talk about Dealing with Ransomware. My favourite subject &#8211; NOT! I touched on this back in #WeekendWisdom number 043, but just this week I&#8217;ve seen some posts from IT people and I was also on a webinar this week where there was an IT person&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/weekendwisdom-078-dealing-with-ransomware/">#WeekendWisdom 078 Dealing with Ransomware</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Welcome to #WeekendWisdom number 78. This week we&#8217;re going to talk about Dealing with Ransomware.<span id="more-2518"></span></p>
<div style="width: 1920px;" class="wp-video"><video class="wp-video-shortcode" id="video-2518-6" width="1920" height="1080" preload="metadata" controls="controls"><source type="video/mp4" src="https://www.l2cybersecurity.com/wp-content/uploads/2021/05/WeekendWisdom-078-lo.mp4?_=6" /><a href="https://www.l2cybersecurity.com/wp-content/uploads/2021/05/WeekendWisdom-078-lo.mp4">https://www.l2cybersecurity.com/wp-content/uploads/2021/05/WeekendWisdom-078-lo.mp4</a></video></div>
<h3>My favourite subject &#8211; NOT!</h3>
<p>I touched on this back in <a href="https://www.l2cybersecurity.com/weekendwisdom-043-paying-the-ransom/" target="_blank" rel="noopener">#WeekendWisdom number 043</a>, but just this week I&#8217;ve seen some posts from IT people and I was also on a webinar this week where there was an IT person that claimed they have cybersecurity skills and they all implied that if you get hit with ransomware that if you just paid the ransom you will be back in business. If you hear somebody say that to you, do not believe them because it is completely false! It is totally wrong! They are lying to you!</p>
<h3>What is the reality in dealing with Ransomware?</h3>
<p>First of all if you do manage to pay the ransom and get your data back, it will take a long time to recover your data, to decrypt all that stuff that&#8217;s been encrypted.</p>
<p>But you might not get your data back at all after paying it. They might not give you the key.</p>
<p>Even if you do get your data back some of it may be corrupted. Particularly if you have large databases.</p>
<p>But even still, if you get the data back, you still have to go through an exercise of sanitizing your complete infrastructure to make sure you remove all traces of the ransomware and any other infections they may have left behind. Any kind of back doors.</p>
<p>A lot of time and effort will be required to recover from a ransomware incident.</p>
<h3>What should you do?</h3>
<p>So if some IT service person says to you &#8220;Ah yeah. Pay the ransom. You&#8217;ll be grand&#8221; They&#8217;re lying. Walk away from them. They haven&#8217;t a clue what they&#8217;re talking about.</p>
<p>What you really need to have in place folks, is have a good backup strategy which is tested. Also have in place incident handling procedures, which you again need to test. Having them in place will help you recover from such an incident much more quickly and easily.</p>
<p>So that’s it for this week. Lets be careful out there and we’ll talk to you again next week.</p>
<hr />
<h2>How can L2 Cyber Security help you?</h2>
<p>We offer a full range of <a href="https://www.l2cybersecurity.com/training" target="_blank" rel="noopener noreferrer">training programmes</a>, which can be delivered online or in-person<strong>*</strong>.</p>
<p>L2 Cyber Security are also a partner of <a href="https://www.cyberriskaware.com/" target="_blank" rel="noopener noreferrer">CyberRiskAware</a> for online self-directed Cyber Security Awareness training and Phishing testing.</p>
<p>Contact us for more information at <a href="mailto:info@L2CyberSecurity.com" target="_blank" rel="noopener noreferrer">info@L2CyberSecurity.com</a>.</p>
<p><strong>*</strong>With appropriate social distancing and other health and safety measures adhered to.</p>
<hr />
<h2>Follow us on Social media:</h2>
<p>Liam is available on <a href="https://twitter.com/L2actual" target="_blank" rel="noopener noreferrer">Twitter</a>, <a href="https://www.linkedin.com/in/lynchliam/" target="_blank" rel="noopener noreferrer">LinkedIn</a> and <a href="https://www.instagram.com/l2actual/" target="_blank" rel="noopener noreferrer">Instagram</a>.</p>
<p>Follow L2 Cyber on <a href="https://twitter.com/L2Cyber" target="_blank" rel="noopener noreferrer">Twitter</a>, <a href="https://www.linkedin.com/company/l2cyber/" target="_blank" rel="noopener noreferrer">LinkedIn</a>, <a href="https://www.instagram.com/l2cyber/" target="_blank" rel="noopener noreferrer">Instagram</a> and <a href="https://www.facebook.com/L2Cyber/" target="_blank" rel="noopener noreferrer">Facebook</a>.</p>
<p><a href="https://www.l2cybersecurity.com/" target="_blank" rel="noopener noreferrer">© L2 Cyber Security Solutions</a></p>
<p>The post <a href="https://www.l2cybersecurity.com/weekendwisdom-078-dealing-with-ransomware/">#WeekendWisdom 078 Dealing with Ransomware</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		<enclosure url="https://www.l2cybersecurity.com/wp-content/uploads/2021/05/WeekendWisdom-078-lo.mp4" length="36861697" type="video/mp4" />

			</item>
		<item>
		<title>#WeekendWisdom 076 Connecting Devices to the Internet</title>
		<link>https://www.l2cybersecurity.com/weekendwisdom-076-connecting-devices-to-the-internet/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Fri, 30 Apr 2021 01:15:17 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[#SecuritySimplified]]></category>
		<category><![CDATA[#WeekendWisdom]]></category>
		<category><![CDATA[CCTV]]></category>
		<category><![CDATA[Clare]]></category>
		<category><![CDATA[Connecting Devices to the Internet]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Limerick]]></category>
		<category><![CDATA[NAS Boxes]]></category>
		<category><![CDATA[QLocker Ransomware]]></category>
		<category><![CDATA[QNAP Nas]]></category>
		<category><![CDATA[Ransomware]]></category>
		<category><![CDATA[Smart Devices]]></category>
		<category><![CDATA[Tipperary]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=2508</guid>

					<description><![CDATA[<p>Welcome to #WeekendWisdom number 76. This week we&#8217;re going to talk about connecting devices to the internet. What happened to the QNAP devices? Last week the software that runs on QNAP Network Attached Storage devices, or also known as NAS boxes, had a vulnerability in them that was exploited. It was in particular targeting the&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/weekendwisdom-076-connecting-devices-to-the-internet/">#WeekendWisdom 076 Connecting Devices to the Internet</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Welcome to #WeekendWisdom number 76. This week we&#8217;re going to talk about connecting devices to the internet.<span id="more-2508"></span></p>
<div style="width: 1920px;" class="wp-video"><video class="wp-video-shortcode" id="video-2508-7" width="1920" height="1080" preload="metadata" controls="controls"><source type="video/mp4" src="https://www.l2cybersecurity.com/wp-content/uploads/2021/04/WeekendWisdom-076-lo.mp4?_=7" /><a href="https://www.l2cybersecurity.com/wp-content/uploads/2021/04/WeekendWisdom-076-lo.mp4">https://www.l2cybersecurity.com/wp-content/uploads/2021/04/WeekendWisdom-076-lo.mp4</a></video></div>
<h3>What happened to the QNAP devices?</h3>
<p>Last week the software that runs on QNAP Network Attached Storage devices, or also known as NAS boxes, had a vulnerability in them that was exploited. It was in particular targeting the QNAP boxes that were connected to the internet, that their contents could be accessed anywhere on the internet. What happened was the vulnerabilities exploited by some bad guys who ransomwared all the contents on those devices and looked for money to get the data back.</p>
<h3>Are there any other things that could be at risk?</h3>
<p>This put me in mind that lots of these NAS boxes and other smart home devices they make it very easy for people to connect them up to their home networks or to their office networks and then connect to them, over the internet through their internet connection and through their firewalls. But the way these things are making it so easy to do that means that they may not be done in as secure a manner as is possible. This was just an example, that these boxes were being taken over and ransomed.</p>
<h3>But you want to be connecting devices to the internet</h3>
<p>So if you have got in place cheap CCTV cameras or other smart home devices or NAS boxes that are connected to the internet, that if you can access it from anywhere outside of your home or your office, you might want to take a review of how securely that is set up, because it&#8217;s possible that these can be compromised and the bad guys can get in to your network through these devices.</p>
<p>So that’s it for this week. Lets be careful out there and we’ll talk to you again next week.</p>
<hr />
<h2>How can L2 Cyber Security help you?</h2>
<p>We offer a full range of <a href="https://www.l2cybersecurity.com/training" target="_blank" rel="noopener noreferrer">training programmes</a>, which can be delivered online or in-person<strong>*</strong>.</p>
<p>L2 Cyber Security are also a partner of <a href="https://www.cyberriskaware.com/" target="_blank" rel="noopener noreferrer">CyberRiskAware</a> for online self-directed Cyber Security Awareness training and Phishing testing.</p>
<p>Contact us for more information at <a href="mailto:info@L2CyberSecurity.com" target="_blank" rel="noopener noreferrer">info@L2CyberSecurity.com</a>.</p>
<p><strong>*</strong>With appropriate social distancing and other health and safety measures adhered to.</p>
<hr />
<h2>Follow us on Social media:</h2>
<p>Liam is available on <a href="https://twitter.com/L2actual" target="_blank" rel="noopener noreferrer">Twitter</a>, <a href="https://www.linkedin.com/in/lynchliam/" target="_blank" rel="noopener noreferrer">LinkedIn</a> and <a href="https://www.instagram.com/l2actual/" target="_blank" rel="noopener noreferrer">Instagram</a>.</p>
<p>Follow L2 Cyber on <a href="https://twitter.com/L2Cyber" target="_blank" rel="noopener noreferrer">Twitter</a>, <a href="https://www.linkedin.com/company/l2cyber/" target="_blank" rel="noopener noreferrer">LinkedIn</a>, <a href="https://www.instagram.com/l2cyber/" target="_blank" rel="noopener noreferrer">Instagram</a> and <a href="https://www.facebook.com/L2Cyber/" target="_blank" rel="noopener noreferrer">Facebook</a>.</p>
<p><a href="https://www.l2cybersecurity.com/" target="_blank" rel="noopener noreferrer">© L2 Cyber Security Solutions</a></p>
<p>The post <a href="https://www.l2cybersecurity.com/weekendwisdom-076-connecting-devices-to-the-internet/">#WeekendWisdom 076 Connecting Devices to the Internet</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		<enclosure url="https://www.l2cybersecurity.com/wp-content/uploads/2021/04/WeekendWisdom-076-lo.mp4" length="32923230" type="video/mp4" />

			</item>
		<item>
		<title>#WeekendWisdom 071 The Rapid Rise of Ransomware</title>
		<link>https://www.l2cybersecurity.com/weekendwisdom-071-the-rapid-rise-of-ransomware/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Fri, 26 Mar 2021 02:15:26 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[#SecuritySimplified]]></category>
		<category><![CDATA[#WeekendWisdom]]></category>
		<category><![CDATA[Clare]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[FBI]]></category>
		<category><![CDATA[FBI IC3]]></category>
		<category><![CDATA[IC3]]></category>
		<category><![CDATA[IC3 2020 report]]></category>
		<category><![CDATA[Limerick]]></category>
		<category><![CDATA[Ransomware]]></category>
		<category><![CDATA[Rapid Rise of Ransomware]]></category>
		<category><![CDATA[Tipperary]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=2482</guid>

					<description><![CDATA[<p>Welcome to #WeekendWisdom number 71. This week we&#8217;re going to talk about the rapid rise of Ransomware. What&#8217;s the story this week? Earlier this week the FBI&#8217;s cyber crime bureau, called IC3, issued their annual report which covered cyber crime in 2020. Now I was looking at the value of the cyber crimes that have&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/weekendwisdom-071-the-rapid-rise-of-ransomware/">#WeekendWisdom 071 The Rapid Rise of Ransomware</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Welcome to #WeekendWisdom number 71. This week we&#8217;re going to talk about the rapid rise of Ransomware.<span id="more-2482"></span></p>
<div style="width: 1920px;" class="wp-video"><video class="wp-video-shortcode" id="video-2482-8" width="1920" height="1080" preload="metadata" controls="controls"><source type="video/mp4" src="https://www.l2cybersecurity.com/wp-content/uploads/2021/03/WeekendWisdom-071-lo.mp4?_=8" /><a href="https://www.l2cybersecurity.com/wp-content/uploads/2021/03/WeekendWisdom-071-lo.mp4">https://www.l2cybersecurity.com/wp-content/uploads/2021/03/WeekendWisdom-071-lo.mp4</a></video></div>
<h3>What&#8217;s the story this week?</h3>
<p>Earlier this week the FBI&#8217;s cyber crime bureau, called IC3, issued their annual report which covered cyber crime in 2020.</p>
<p>Now I was looking at the value of the cyber crimes that have been reported to the FBI and the top two remain the usual suspects of Business Email Compromise or CEO fraud and Confidence or Romance scams. They&#8217;re still the top two.</p>
<h3>What kind of figures are we looking at?</h3>
<p>But I was looking at the figure for Ransomware and I was comparing it back to previous years and you can see here, I have a table which shows that you can see, from the last 2 years that:</p>
<ul>
<li>The Business Email Compromise/CEO fraud was an increase of 44%, to 1.86 billion dollars.</li>
<li>Confidence/Romance fraud was an increase of 66% to 600 million dollars.</li>
<li>Ransomware, it grew in the last 2 years by over 700%.</li>
</ul>
<h3>Wow! That is a Rapid Rise of Ransomware.</h3>
<p>So that is just a massive increase. Now the figure here reported at 29 million isn&#8217;t really large. But then again not everybody reports ransomware. Also those figures will not take into account any recovery costs involved in getting back to operation after you&#8217;ve paid a ransom or you&#8217;ve had a ransomware incident. So there&#8217;s a lot more costs that are included in Ransomware that aren&#8217;t reported here.</p>
<p>So that’s it for this week. Lets be careful out there and we’ll talk to you again next week.</p>
<hr />
<h2>How can L2 Cyber Security help you?</h2>
<p>We offer a full range of <a href="https://www.l2cybersecurity.com/training" target="_blank" rel="noopener noreferrer">training programmes</a>, which can be delivered online or in-person<strong>*</strong>.</p>
<p>L2 Cyber Security are also a partner of <a href="https://www.cyberriskaware.com/" target="_blank" rel="noopener noreferrer">CyberRiskAware</a> for online self-directed Cyber Security Awareness training and Phishing testing.</p>
<p>Contact us for more information at <a href="mailto:info@L2CyberSecurity.com" target="_blank" rel="noopener noreferrer">info@L2CyberSecurity.com</a>.</p>
<p><strong>*</strong>With appropriate social distancing and other health and safety measures adhered to.</p>
<hr />
<h2>Follow us on Social media:</h2>
<p>Liam is available on <a href="https://twitter.com/L2actual" target="_blank" rel="noopener noreferrer">Twitter</a>, <a href="https://www.linkedin.com/in/lynchliam/" target="_blank" rel="noopener noreferrer">LinkedIn</a> and <a href="https://www.instagram.com/l2actual/" target="_blank" rel="noopener noreferrer">Instagram</a>.</p>
<p>Follow L2 Cyber on <a href="https://twitter.com/L2Cyber" target="_blank" rel="noopener noreferrer">Twitter</a>, <a href="https://www.linkedin.com/company/l2cyber/" target="_blank" rel="noopener noreferrer">LinkedIn</a>, <a href="https://www.instagram.com/l2cyber/" target="_blank" rel="noopener noreferrer">Instagram</a> and <a href="https://www.facebook.com/L2Cyber/" target="_blank" rel="noopener noreferrer">Facebook</a>.</p>
<p><a href="https://www.l2cybersecurity.com/" target="_blank" rel="noopener noreferrer">© L2 Cyber Security Solutions</a></p>
<p>The post <a href="https://www.l2cybersecurity.com/weekendwisdom-071-the-rapid-rise-of-ransomware/">#WeekendWisdom 071 The Rapid Rise of Ransomware</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		<enclosure url="https://www.l2cybersecurity.com/wp-content/uploads/2021/03/WeekendWisdom-071-lo.mp4" length="29539002" type="video/mp4" />

			</item>
		<item>
		<title>#WeekendWisdom 059 A Review of 2020</title>
		<link>https://www.l2cybersecurity.com/weekendwisdom-059-a-review-of-2020/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Fri, 18 Dec 2020 02:15:25 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[#SecuritySimplified]]></category>
		<category><![CDATA[#WeekendWisdom]]></category>
		<category><![CDATA[2020]]></category>
		<category><![CDATA[Clare]]></category>
		<category><![CDATA[Covid-19]]></category>
		<category><![CDATA[Covid19]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Limerick]]></category>
		<category><![CDATA[Ransomware]]></category>
		<category><![CDATA[Review of 2020]]></category>
		<category><![CDATA[Tipperary]]></category>
		<category><![CDATA[Windows 7]]></category>
		<category><![CDATA[Zoom Bombing]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=2412</guid>

					<description><![CDATA[<p>Welcome to #WeekendWisdom number 59. This week we&#8217;re going to do a review of 2020. The year in Ransomware: 2020 started out with a number of #Ransomware incidents that were occurring over the New Year period. Ransomware became a greater threat throughout the year, with increased demands by the criminals looking to extort from their&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/weekendwisdom-059-a-review-of-2020/">#WeekendWisdom 059 A Review of 2020</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Welcome to #WeekendWisdom number 59. This week we&#8217;re going to do a review of 2020.<span id="more-2412"></span></p>
<div style="width: 1920px;" class="wp-video"><video class="wp-video-shortcode" id="video-2412-9" width="1920" height="1080" preload="metadata" controls="controls"><source type="video/mp4" src="https://www.l2cybersecurity.com/wp-content/uploads/2020/12/WeekendWisdom-059-lo.mp4?_=9" /><a href="https://www.l2cybersecurity.com/wp-content/uploads/2020/12/WeekendWisdom-059-lo.mp4">https://www.l2cybersecurity.com/wp-content/uploads/2020/12/WeekendWisdom-059-lo.mp4</a></video></div>
<h3>The year in Ransomware:</h3>
<p>2020 started out with a number of #Ransomware incidents that were occurring over the New Year period. Ransomware became a greater threat throughout the year, with increased demands by the criminals looking to extort from their victims. So I continue to hopefully offer advice and guidance to you, on how you can protect your business from these threats.</p>
<h3>The end of Windows 7:</h3>
<p>We also saw the end of support for Windows 7. So if you&#8217;re continuing to use a #Windows7 machine in your organisations, you really need to get off that platform and move on to the more recent Windows 10 or other operating systems.</p>
<h3>The COVID-19 Pandemic:</h3>
<p>And of course 2020 brought us the biggest news of all with the #COVID19 pandemic. I provided lots of advice and guidance on how you can get your staff working from home safely and securely. Protecting both themselves and your business from the threats that were out there.</p>
<h3>The Zoom Bombing phenomenon:</h3>
<p>And one of those threats of course was #ZoomBombing, which I dedicated an entire video to, on how you can protect yourself from that.</p>
<h3>All the rest in the Review of 2020:</h3>
<p>There&#8217;s lots of other little bits and nuggets of information which I thought were maybe interesting and useful. I hope you found them similarly and I hope to continue to provide these to you in 2021.</p>
<h3>Happy Christmas:</h3>
<p>So with that, I would just like to wish you and yours the very happiest of Christmases and I hope you have a safe and secure New Year.</p>
<p>So that&#8217;s it for this year. Let&#8217;s be careful out there and we&#8217;ll talk to you again next year.</p>
<hr />
<h2>How can L2 Cyber Security help you?</h2>
<p>We offer a full range of <a href="https://www.l2cybersecurity.com/training" target="_blank" rel="noopener noreferrer">training programmes</a>, which can be delivered online or in-person<strong>*</strong>.</p>
<p>L2 Cyber Security are also a partner of <a href="https://www.cyberriskaware.com/" target="_blank" rel="noopener noreferrer">CyberRiskAware</a> for online self-directed Cyber Security Awareness training and Phishing testing.</p>
<p>Contact us for more information at <a href="mailto:info@L2CyberSecurity.com" target="_blank" rel="noopener noreferrer">info@L2CyberSecurity.com</a>.</p>
<p><strong>*</strong>With appropriate social distancing and other health and safety measures adhered to.</p>
<hr />
<h2>Follow us on Social media:</h2>
<p>Liam is available on <a href="https://twitter.com/L2_Evangelist" target="_blank" rel="noopener noreferrer">Twitter</a>, <a href="https://www.linkedin.com/in/lynchliam/" target="_blank" rel="noopener noreferrer">LinkedIn</a> and <a href="https://www.instagram.com/l2_evangelist/" target="_blank" rel="noopener noreferrer">Instagram</a>.</p>
<p>Follow L2 Cyber on <a href="https://twitter.com/L2Cyber" target="_blank" rel="noopener noreferrer">Twitter</a>, <a href="https://www.linkedin.com/company/l2cyber/" target="_blank" rel="noopener noreferrer">LinkedIn</a>, <a href="https://www.instagram.com/l2cyber/" target="_blank" rel="noopener noreferrer">Instagram</a> and <a href="https://www.facebook.com/L2Cyber/" target="_blank" rel="noopener noreferrer">Facebook</a>.</p>
<p><a href="https://www.l2cybersecurity.com/" target="_blank" rel="noopener noreferrer">© L2 Cyber Security Solutions</a></p>
<p>The post <a href="https://www.l2cybersecurity.com/weekendwisdom-059-a-review-of-2020/">#WeekendWisdom 059 A Review of 2020</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		<enclosure url="https://www.l2cybersecurity.com/wp-content/uploads/2020/12/WeekendWisdom-059-lo.mp4" length="30596734" type="video/mp4" />

			</item>
		<item>
		<title>#WeekendWisdom 046 Securing Backup Servers</title>
		<link>https://www.l2cybersecurity.com/weekendwisdom-046-securing-backup-servers/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Thu, 17 Sep 2020 23:05:35 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[#SecuritySimplified]]></category>
		<category><![CDATA[#WeekendWisdom]]></category>
		<category><![CDATA[Backup Servers]]></category>
		<category><![CDATA[Backups]]></category>
		<category><![CDATA[Clare]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Development Servers]]></category>
		<category><![CDATA[Limerick]]></category>
		<category><![CDATA[Offline Backups]]></category>
		<category><![CDATA[Ransomware]]></category>
		<category><![CDATA[Securing Backup Servers]]></category>
		<category><![CDATA[Securing Development Servers]]></category>
		<category><![CDATA[Securing Test Servers]]></category>
		<category><![CDATA[Test Servers]]></category>
		<category><![CDATA[Tipperary]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=2287</guid>

					<description><![CDATA[<p>Welcome to #WeekendWisdom number 46. This week we&#8217;re going to talk about securing backup servers. OK. Who wasn&#8217;t securing backup servers? Earlier this week I was reading a story about a large Canadian second-hand car business which had a data breach involving some 260,000 users. What had happened was that they had a backup server&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/weekendwisdom-046-securing-backup-servers/">#WeekendWisdom 046 Securing Backup Servers</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Welcome to #WeekendWisdom number 46. This week we&#8217;re going to talk about securing backup servers.<span id="more-2287"></span></p>
<div style="width: 1280px;" class="wp-video"><video class="wp-video-shortcode" id="video-2287-10" width="1280" height="720" preload="metadata" controls="controls"><source type="video/mp4" src="https://www.l2cybersecurity.com/wp-content/uploads/2020/09/WeekendWisdom-046-lo.mp4?_=10" /><a href="https://www.l2cybersecurity.com/wp-content/uploads/2020/09/WeekendWisdom-046-lo.mp4">https://www.l2cybersecurity.com/wp-content/uploads/2020/09/WeekendWisdom-046-lo.mp4</a></video></div>
<h3>OK. Who wasn&#8217;t securing backup servers?</h3>
<p>Earlier this week I was reading a story about a large Canadian second-hand car business which had a data breach involving some 260,000 users. What had happened was that they had a backup server that wasn&#8217;t appropriately secured. People were able to get onto that backup server and download the data of all these users.</p>
<p>Basically that business did not appropriately secure the backup server. Maybe they thought &#8220;It&#8217;s a backup server it doesn&#8217;t need that much protection.&#8221; But think about it. A backup server is going to have a lot of your production data.</p>
<h3>So what does it need to set to?</h3>
<p>So the backup server needs to have the same level of security if not more so than your primary servers. Make sure that they are properly secured.<br />
Also with backups, I would also highly recommend having offline copies of the backups. Just in case that backup server ever gets damaged in any way by ransomware. So it&#8217;s important to back those up offline as well.</p>
<h3>Is that all?</h3>
<p>No. It&#8217;s not just backup servers that you need to take consideration of. Things like development servers or test servers. If you have some of those in your environment, they should have appropriate protections on there as well, because maybe they have some test data with actual personal data on them too. So ask your IT or your development team &#8220;Have you put appropriate protections in place on these servers?&#8221;</p>
<p>So that’s it for this week. Let’s be careful out there and we’ll talk to you again next week.</p>
<hr />
<h2>How can L2 Cyber Security help you?</h2>
<p>For small business, we can carry out assessments on your server infrastructure and point out discrepancies on the security configurations.</p>
<p>We offer a full range of <a href="https://www.l2cybersecurity.com/training" target="_blank" rel="noopener noreferrer">training programmes</a>, which can be delivered online or in-person<strong>*</strong>.</p>
<p>L2 Cyber Security are also a partner of <a href="https://www.cyberriskaware.com/" target="_blank" rel="noopener noreferrer">CyberRiskAware</a> for online self-directed Cyber Security Awareness training and Phishing testing.</p>
<p>Contact us for more information at <a href="mailto:info@L2CyberSecurity.com" target="_blank" rel="noopener noreferrer">info@L2CyberSecurity.com</a>.</p>
<p><strong>*</strong>With appropriate social distancing and other health and safety measures adhered to.</p>
<hr />
<h2>Follow us on Social media:</h2>
<p>Liam is available on <a href="https://twitter.com/L2_Evangelist" target="_blank" rel="noopener noreferrer">Twitter</a>, <a href="https://www.linkedin.com/in/lynchliam/" target="_blank" rel="noopener noreferrer">LinkedIn</a> and <a href="https://www.instagram.com/l2_evangelist/" target="_blank" rel="noopener noreferrer">Instagram</a>.</p>
<p>Follow L2 Cyber on <a href="https://twitter.com/L2Cyber" target="_blank" rel="noopener noreferrer">Twitter</a>, <a href="https://www.linkedin.com/company/l2cyber/" target="_blank" rel="noopener noreferrer">LinkedIn</a>, <a href="https://www.instagram.com/l2cyber/" target="_blank" rel="noopener noreferrer">Instagram</a> and <a href="https://www.facebook.com/L2Cyber/" target="_blank" rel="noopener noreferrer">Facebook</a>.</p>
<p><a href="https://www.l2cybersecurity.com/" target="_blank" rel="noopener noreferrer">© L2 Cyber Security Solutions</a></p>
<p>The post <a href="https://www.l2cybersecurity.com/weekendwisdom-046-securing-backup-servers/">#WeekendWisdom 046 Securing Backup Servers</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		<enclosure url="https://www.l2cybersecurity.com/wp-content/uploads/2020/09/WeekendWisdom-046-lo.mp4" length="24796104" type="video/mp4" />

			</item>
	</channel>
</rss>
