Recent Blog Posts

Who’s Behind the Recent String of High Profile Ransomware Attacks?

Posted on: July 12th, 2016 by Wolf TG Admin
With the growing popularity of ransomware cyber attacks, we thought we'd spend the next few weeks covering the topic so you can better understand what ransomware attacks are, who's behind them, how to protect against them, and what to do if you becom ... Read Full Article

8 High Profile Ransomware Attacks You May Not Have Heard Of

Posted on: July 5th, 2016 by Wolf TG Admin
With the growing popularity of ransomware cyber attacks, we thought we'd spend the next few weeks covering the topic so you can better understand what ransomware attacks are, who's behind them, how to protect against them, and what to do if you becom ... Read Full Article

Ransomware Highlights the Importance of a Solid Backup Infrastructure

Posted on: June 28th, 2016 by Wolf TG Admin
With the growing popularity of ransomware cyber attacks, we thought we'd spend the next few weeks covering the topic so you can better understand what ransomware attacks are, who's behind them, how to protect against them, and what to do if you becom ... Read Full Article

How Does Ransomware Infect a Network?

Posted on: June 21st, 2016 by Wolf TG Admin
With the growing popularity of ransomware cyber attacks, we thought we'd spend the next few weeks covering the topic so you can better understand what ransomware attacks are, who's behind them, how to protect against them, and what to do if you becom ... Read Full Article

Ransomware: The Cyber Threat No One is Talking About (but Everyone Should be)

Posted on: June 14th, 2016 by Wolf TG Admin
With the growing popularity of ransomware cyber attacks, we thought we'd spend the next few weeks covering the topic so you can better understand what ransomware attacks are, who's behind them, how to protect against them, and what to do if you becom ... Read Full Article