Out of the Box Solutions Blog

Out of the Box Solutions has been serving the Michigan area since 2002, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses

This Florida City Will Pay 65 Bitcoins to Get Files Back

Florida’s Atlantic coast is a destination for millions of visitors each year. One visitor is costing a coastal city a pretty penny. Riviera Beach, a small city just north of West Palm Beach, has been hit with a major ransomware attack. Today, we’ll tell you how it came to be that the small beach city would make dubious history by paying what is the largest ransomware payout in the short history of these attacks.

0 Comments
Continue reading

Is it Wrong to Purchase Access to Your Own Data?

Ransomware is a contender for the favorite method of attack for hackers. If you think about it, ransomware presents a no-loss situation. Either the victim pays the ransom and the hackers laugh all the way to the bank, or they move on to the next target and give them the same ultimatum.

0 Comments
Continue reading

Hack Enabled by NSA-Developed Tool

Hackers aren’t the only ones out there developing malware tools, but sometimes, they get their hands on some of the others. This is precisely what happened when Double Pulsar, a malware that the NSA has used in the past, was paired with a Chinese hacking tool and used to attack Hong Kong and Belgium in 2016.

0 Comments
Continue reading

Ransomware Can Just Be Devastating

Ransomware is still going strong, and now more than ever it’s important to emphasize the danger that it poses for your organization. Even municipalities and other high-profile targets are at risk of being taken down by ransomware. Since 2013, over 170 government systems at the county, city, or state levels have been attacked.

0 Comments
Continue reading

Mobile Malware is on the Rise

When considering cybersecurity, it can be easy to overlook the computers that so many of us typically carry with us every day: our smartphones. However, as attacks to mobile devices have risen considerably in the recent past, it is important to recognize the severity of these attacks, as well as how to avoid them.

0 Comments
Continue reading

Most Noteworthy Data Breaches in 2019

With data starting to be treated more like a commodity, companies are spending more time and money attempting to secure the data they have. Some organizations aren’t successful. In 2018 over 446.5 million records were exposed, even as data breaches dropped by 23 percent to 1,244. Today we take a look at some of the most noteworthy data breaches that have happened in the first four months of 2019.

0 Comments
Continue reading

SamSam Is More than a Computer Virus

I think by now most people understand just how dangerous ransomware is. Even with some of the ridiculous names they have like Gandcrab, Jigsaw, and WannaCry. Hell, two strains even have names from the James Bond canon: LeChiffre and GoldenEye. But one funny-named strain of ransomware, SamSam, has been devastating information systems for sometime, and has caught the eye of several U.S. law enforcement agencies.

0 Comments
Continue reading

A Short Look at 2018 in Cybersecurity

Hackers and other security threats are everyday problems for users all over the world. We’re not even talking about just simple phishing emails--you’d be surprised by how many victims are from straight-up hacking attacks. The security sector has been forced to adapt, growing at an astronomical rate. To help your organization get up to speed on the latest threats and hacks, we’ve put together a list of the first half of 2018’s most notorious breaches and statistics related to them.

0 Comments
Continue reading

The Nigelthorn Malware is a Lot Less Friendly than its Namesake

You can never be too careful about what you install on your computers. In this most recent example, Google Chrome users are finding themselves targeted by a new type of malware called Nigelthorn.

0 Comments
Continue reading

Ransomware Attack Strikes Atlanta

Ransomware can target all kinds of entities, but one of the most devastating attacks in recent memory was launched against Atlanta, Georgia earlier this year. Atlanta suffered from an incredibly sustained and powerful ransomware attack that disabled much of the municipal government.

0 Comments
Continue reading

North Korea Suspected as Responsible for WannaCry Attack

According to the homeland security adviser to the White House, Tom Bossert, international blame for the global WannaCry attack is being directed toward North Korea. Responsibility for the attack that spanned from May 12th to the 15th of 2017 has been firmly placed on the Democratic People’s Republic of Korea, which Bossert says is in agreement with the conclusions of Australia, Canada, Japan and New Zealand.

0 Comments
Continue reading

The Right Analogy Makes Hacking Make More Sense

How often have you started to read something you thought may be valuable to you, only to put it down a few moments later, completely lost because of the use of technical language and industry jargon? The IT industry can be especially guilty of this. However, since this is need-to-know information, we’ve decided to go over a few crucial security concepts by representing your business security with a locked door.

0 Comments
Continue reading

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Network Security Productivity User Tips Communication Privacy Malware Efficiency Microsoft Data Tech Term Internet Google Smartphones Hardware Mobile Device Hackers Computer Innovation Ransomware Windows 10 IT Support Email Cybersecurity Android Users Managed IT Services Browser Passwords Small Business Software Network Mobile Devices Cloud Business Communications Business Management Workplace Tips Collaboration IT Services Applications Outsourced IT Social Media Cloud Computing Managed IT services Apps Bandwidth Employer-Employee Relationship Data Backup VoIp Wi-Fi Hosted Solutions Wireless Information Holiday Data recovery Internet of Things Backup Saving Money Smartphone Value Laptop Business Intelligence Managed Service Blockchain Gmail Marketing Gadgets Save Money Miscellaneous Networking Microsoft Office Upgrade Connectivity Artificial Intelligence Company Culture Analytics Office Virtual Assistant Password Medical IT Chrome Wireless Charging Facebook Office 365 Cost Management Healthcare Cortana Virtualization Mobility Telephony Voice over Internet Protocol VPN Data Security Net Neutrality Data Management Compliance Computers G Suite Processor BDR Tech Terms RAM Remote Monitoring and Management Automation Managed IT Service Access Control Patch Management Remote Computing Paperless Office eCommerce Hybrid Cloud Amazon Eliminating Downtime Benchmarks Processors Dark Web Payment Excel Operating System Electronic Health Records National Security Dongle Paper Wearables Authentication Video Maintenance Analysis Certification Telecommuting Movies Digital Data loss Online Shopping Cables BYOD Tip of the week Technology Tips Vulnerability Machine Learning Error instant Messaging Knowledge Managing Stress Troubleshooting Health Content Filtering Windows Ink SaaS Phishing Authorization Chrome OS Comparison Customer Service Router IT Management Twitter Spam Database Plug-In Wireless Internet User Tip Streaming Media Spyware Vulnerabilities Environment Big Data Update Updates Government PowerPoint WannaCry Server Management GDPR Data Breach Specifications OneNote Websites Internet Explorer Server Training Workers Inventory Unified Communications Edge Virus Employees Voice over IP Cybercrime Settings Proactive IT Help Desk Backup and Disaster Recovery Downloads HP Touchscreen Cryptocurrency e-waste Outlook Sports HIPAA Personal Information Sales Human Resources Windows Server 2008 R2 Safety Threat Security Cameras Millennials Data Protection Antivirus Windows 7 Solid State Drive Tactics IT budget Business Continuity Hard Drives Trends Document Management Telecommute Microsoft Office 365 disposal Bring Your Own Device Physical Security Profitability Display Hard Drive Storage E-Commerce Tablet Staff Employee-Employer Relationship Conferencing Taskbar Printing Lead Generation Network Attached Storage Reporting Word Business Technology Mobile Security Microsoft Teams Time Management Hard Disk Drive Battery SSD A.I. Printers Risk Management Quick Tips Disaster Recovery Regulation Alert