Author Archives: Mark Van Sweringen

Axiom Cyber Solutions Wins Runner-Up for Launching Las Vegas Award

Dr. Samir Pancholi and the Launching Las Vegas Committee are proud to announce the winner of the third annual Launching Las Vegas award, Wedspire. Launching Las Vegas was created in 2015 to celebrate those who work hard to build up Vegas and support our community. The annual contest has awarded $2,500 to local businesses since its inception.

Hundreds of votes were cast as community members came out in full force to recognize their favorite of three nominated startup companies: Wedspire, Axiom Cyber Solutions, and Fuelixer. All companies were chosen for their dedication and contributions to the Las Vegas entrepreneurial community—and they epitomize the hard work and passion Las Vegans are known for.

Axiom Cyber Solutions was awarded second place and a $250 cash prize. Axiom Cyber Solutions is a Las Vegas cyber security company focused on providing holistic, enterprise-class cyber security solutions to small-to-medium businesses. They’re dedicated to protecting businesses most at-risk of attack by providing a firewall backed by the SecureAmerica Threat Defense Platform, antivirus, and Endpoint Detection and Response for a low monthly subscription cost.

“We are honored to have been selected as one of the Launching Las Vegas finalists,” responds Troy Wilkinson, CEO of Axiom Cyber Solutions. “We would like to thank Dr. Pancholi for establishing the award and recognizing the startup businesses of Las Vegas. Thank you to all of our supporters for their votes.”

About Dr. Pancholi & Launching Las Vegas: Dr. Samir Pancholi is a Las Vegas-based cosmetic surgeon and owner and director of a thriving practice. As a local business owner himself, Dr. Pancholi understands the challenges and rewards of starting your own company—and he created the annual Launching Las Vegas award in 2015 to celebrate, honor, and support fellow entrepreneurs and the Las Vegas business community as it expands. Visit drpancholi.com or call 702.363.0240 to learn more about Launching Las Vegas. Dr. Pancholi is available for interview upon request.

What is Firewall-as-a-Service?

The firewall is one of the most important components of cybersecurity. The firewall sits at the edge of the internet connection filtering everything going into and out of the business.

One of the biggest gaps in any company’s cybersecurity strategy is constantly updating the firewall against the latest threat. Once a new threat or vulnerability is identified in the world, hackers have a new tool to break into your business. Your risk only increases until you patch your firewall against that threat. This is the cornerstone why Axiom was founded.

Not only do we provide proprietary Axiom technology that can process packets faster than other chipsets on the market, we fully configure the device for every business because no two businesses are the same. We then manage that device so that as new configurations become necessary, such as VPN tunnels or open ports, our experts can make those changes securely, so you don’t have to worry about accidentally leaving a backdoor open to hackers when changes are made.

The devices are monitored 24/7 by certified cybersecurity experts for indicators of compromise (IoC) as well as breach activity and attacks such as DDoS or ransomware. Our engineers monitor uptime and will reach out to the client if we see an outage, a major attack, or an advanced persistent threat.

Most importantly, our devices are updated more than 52,000 times per year. Because we fully manage the firewall, we can provide the most broad-spectrum updates in the industry. Behaviors, signatures, definitions, access control lists, heuristics, black lists, block lists, encryption algorithms and much more can be updated without the need to restart the device. Because of this advance in technology, we are able to reduce the amount of time from identification of a vulnerability to patching against it down to minutes rather than months.

Our updates originate from the SecureAmerica Threat Defense platform which is Axiom’s proprietary big data analytics engine that brings in multiple threat feeds from open and closed sources of vulnerability and hacker information. The platform then creates an update that is specific for our customers and pushes it out in real time. Our clients also become sources of threat intelligence. If their device sees a “Zero Day” attack, our firewall will send that to the platform and the update creation process begins. Within minutes of a client seeing a new threat, every Axiom customer is protected against it.

Axiom also provides real time feedback through our customer portal. This allows business owners and executives to get a real time look into what may be hitting their company. For IT administrators, there is a dashboard feature coming soon that will give full local visibility into logs, configurations, connections, and prevention statistics. Each month, the designated executive will receive summary reports so that you understand the tremendous value Axiom brings. When’s the last time your firewall emailed you to let you know it’s doing its job?

One of the benefits of Firewall as a Service is the need for less staff to manage it. Cybersecurity staff members can be costly and hard to find. Cybersecurity jobs are plentiful and employees to fill these roles are increasingly hard to find. Axiom can save businesses thousands of dollars in staff dollars alone. Another benefit is lower TCO or “total cost of ownership”. Because the hardware is included in the monthly subscription, there’s no large outlay of capital. Next generation firewalls can cost hundreds or thousands of dollars depending on throughput. With Axiom, you get the right device for your business at a low monthly subscription you can afford.

Another benefit is the unlimited change requests and support. Our engineers are here 24/7 to assist with whatever changes are needed and any tech support questions about our device or platform.

Call today to see if you qualify for a trial of the Axiom Firewall as a Service. Once you get your first monthly report of all the threats and attacks Axiom is able to prevent, we’re confident you’ll want to keep us in place.

Axiom Cyber Solutions Nominated for Launching Las Vegas Award

For the third year in a row, the Launching Las Vegas award is celebrating Vegas-based startup companies—and voting for the 2017 contest is officially open for public voting. Launching Las Vegas, was created to honor the hard work local startups and entrepreneurs devote to helping Vegas shine as a hub for business.

Axiom Cyber Solutions is honored to have been nominated along with two other Las Vegas start-ups for the third annual award.

“I’m proud to see Launching Las Vegas grow and evolve as our business community diversifies,” says Dr. Samir Pancholi, creator of the award. “I am continually inspired by our local entrepreneurs, and it has been an honor to spotlight and support these stellar businesses over the last few years.”

The winner of the 2017 Launching Las Vegas award will be chosen via an online voting system, Tuesday, October 17, 2017 through Thursday, November 2nd, 2017. Users will be able to vote for their favorite startup company once per day through the duration of the contest.

“Our voters will have a difficult time choosing from our talented group of nominees this year. I encourage everyone to spread the word, vote every day, and help support local business,” emphasizes Dr. Pancholi. “I wish our nominees the best of luck and look forward to continually finding new ways to support and elevate our incredible community.”

NotPetya Ransomware Attack Spread Rapidly Across World

A new worldwide ransomware attack has hit hard just a little over a month after the WannaCry attack. The attack appeared to start in Ukraine and the spread across Europe but has made its way to the US in the past 24 hours, taking down systems at US pharma company Merck & Co.

Worldwide advertising agency WPP, Dutch shipping company AP Moller-Maersk, Russia’s main oil producer Rosneft, a Cadbury Chocolate factory, and the Ukrainian National Bank are just a handful of the notable companies affected by the new attack.

Victims of the ransomware are being asked to pay $300 in Bitcoin cryptocurrency to unlock their systems.

The Petya Ransomware Variant

Differing from other ransomware families, that encrypt specific files, the Petya variant of ransomware does not attack the individual files. Instead Petya encrypts the master file table (MFT) and renders the computer’s master boot record (MBR) inoperable. In plain English, what Petya does is seize the record about where on the physical hard drive the operating system is located and then denies access to it. The MBR is then replaced with a ransom note that displays a message stating:

“If you see this text, then your files are no longer accessible, because they are encrypted. Perhaps you are busy looking for a way to recover your files, but don’t waste your time. Nobody can recover your files without our decryption service”.

NotPetya Is Fooling Anti-Virus and Infecting Patched Systems

The new variant of Petya, called Petwrap, is particularly nasty as it has been able to fool many anti-virus tools and has been able to successfully infect systems that have been patched against the EternalBlue vulnerability that allowed WannaCry to spread rapidly.

If for some reason, a business has not applied the critical Windows SMB patches for EternalBlue (MS17-010), the business needs to disable the SMBv1 protocol now rather than later to prevent infection.

System admins are also encouraged to disable WMIC (Windows Management Instrumentation Command-Line) which is being used to spread the infection across patched systems.

A vaccine of sorts has been discovered by security researchers and can prevent companies from becoming infected by creating a file in their systems that the ransomware looks for before encryption takes place. Detailed instructions can be found at BleepingComputer.

Victims May Have Nowhere To Turn

After demanding the ransom, hackers told victims to send an email to a Posteo email account with the infection ID and the victim’s Bitcoin wallet hash. Posteo quickly shut downthe email account stating that “We do not tolerate any misuse of our platform: The intermittent blocking of abused mailboxes is a normal procedure of providers in such cases.” which has left victims stuck with no way to contact the hackers behind the attack should they decide to pay.

Additionally, as researchers continue to look into NotPetya, it has been discovered that it was not a true ransomware but instead what is known as a wiper malware. Ransomware’s intent is to make money where wiper malware seeks to create havoc by destroying systems. Victims of NotPetya not only had no where to turn for making ransom payments but they also would not be able to recover their files even if they had been provided a decryption key.

Why is cloud security not a good thing?

Why is cloud security not a good thing?

With everyone moving to the cloud, internet service providers will try to sell you on a cloud based firewall. There are hundreds of companies that will scrub your traffic “in the cloud” before it comes into your business.

The benefits are obvious. No need for expensive on premise firewalls. No need for an IT professional on staff to manage, monitor and update security equipment. Your internet traffic will magically be cleansed of threats by the cloud security police and you will only receive the cleanest, purest internet traffic.

There is only one problem with this. Hackers don’t play by the rules!

Just like a traffic cop, your internet service provider directs traffic through their cloud scrubbing center and then on to you. Your internet traffic has to follow very specific routes designated by your internet provider. Hackers don’t follow red lights, yield signs or wrong way signs.

In 100% of businesses there is a router placed there by the internet service provider. This device is the internet handoff from the ISP to the business. Hackers target these devices via unique identifiers, MAC address or IP address. Even if these devices are hidden by the ISP, hackers have tools to identify them. They then attempt multiple attack schemes to gain access to this device.

If they are successful, they own 100% of the business network. Remember that you have moved your firewall into the cloud. There is no longer a firewall at your edge to protect you. Just like the gate to your castle, you can’t remove it and assume the traffic cop down the street will keep the bad guys out.

This is where Axiom excels. With our SecureAmerica® program, we provide you with a fully configured firewall for your edge. It is the first stop into the business and the last stop out. We monitor threats coming in and going out to protect your business from Ransomware, malware, intrusion attempts, cross site scripting, SQL injections, distributed denial of service attacks and many others.

The secret is in the automation we have built into the threat intelligence gathering and deployment. Axiom’s customers get updates to their firewalls every ten minutes based on real world threats that are identified by global agencies such as the FBI, Homeland Security and the IANA. Other companies wait 3 months or longer to patch holes in their firewalls, leaving them vulnerable to attack. Our proprietary update automation collects this data from trusted sources in real time and creates a firewall update via an ETL process (Extract, transform, and load). That update is checked for integrity and quality assurance and then pushed to our entire client base every ten minutes meaning our customers are on the cutting edge of protection. If a threat is detected by one of our client’s Axiom firewalls and it meets the threshold of a verified attack, the entire ETL process begins again, building a custom update that is pushed out to all of our client base within ten minutes. As our clients grow, our artificial intelligence engine will become smarter, creating a community of well protected and happy clients.

Our team of cybersecurity experts monitor clients 24 hours a day to ensure protection is up to date and none of our clients are under attack. All updates, monitoring, configuration, support, reporting and the equipment is included in our monthly subscription prices. Protection starts at $199 per month. At that price, who could afford not to have Axiom SecureAmerica®?

Ransomware is the biggest emerging cyber threat for 2016. Get protected now before it’s too late.

Ransomware is the biggest emerging cyber threat for 2016. Get protected now before it’s too late.

Ransomware has become a household word recently. With the attacks on American Healthcare facilities, large school districts and America’s core businesses, we have all unfortunately learned that ransomware is dangerous and lucrative to the criminals. These hackers are gaining millions of dollars every month from locking up unsuspecting victim’s files.

Just today, in a group that I am a member of on LinkedIn, there was a post looking for help after files had been encrypted. Once the files are encrypted IT IS TOO LATE. Even the FBI has said that the SHA-256 encryption is too good to crack and that you should pay to get your files back.

Businesses must act BEFORE an infection. This is a definite case of “preparation is key”. I talk to more than 3 businesses each week that have been affected. They all didn’t believe they were a target for hackers. They all say the same thing “I didn’t think this could happen to me.” Most are small business owners who generally have a false sense of security or have taken the “head in the sand” approach.

There are three key things you can do to protect yourself from Ransomware. I recommend you act today to implement these three key strategies.

  1. Backups. This is kryptonite to the ransomware epidemic. If a business has up to date backups of their data, there is no need to pay to get it unlocked. A simple restore from the latest backup will have your files back in working condition in no time. The drawback is: When was your last backup? Is it an hour, a day or longer? You can only recover to the latest backup so make sure you are running them on a schedule that makes sense for your business model. You must also ensure that the ransomware is completely removed from enterprise systems and every endpoint. Just like a virus, it spreads polymorphically (changing and evolving) across the network infecting as many machines as it can. You have to have a removal strategy once infected. This includes segmenting affected computers, running in-depth malware, virus and rootkit scans to ensure the infection won’t come back.
  2. Antivirus. You must have up to date antivirus running on every endpoint in the enterprise. From the point of sale system to back of house, every PC, Mac, server, and storage device must be running up-to-date antivirus. It is a good idea to have an antivirus monitor that tells you when machines are out of date or are not updating appropriately. There are some inexpensive antivirus monitoring tools out there that allow you to inventory your devices and also alert you to antivirus status. The drawback to antivirus protection against ransomware is that hackers are changing their algorithms every day to get around antivirus. Antivirus is signature based and it compares each file with known malware, viruses and ransomware. If you are unlucky enough to get a new variant, such as Locky, that is polymorphic or that is not known to your antivirus client, it still gets through. Due to the millions of infections each month, it is safe to say that not all antivirus is keeping up. With that being said, having up to date antivirus across the enterprise is one of the cornerstones of a solid cybersecurity strategy.
  3. Firewall Protection. Firewalls are much different from antivirus because they inspect all traffic coming into the business. Depending on the firewall brand, such as Axiom, the firewall will have deep packet inspection and some other key features that will scan packets for threats. One thing at Axiom that we have found is the specific protocol level communication that happens when a ransomware is activated on your network. Ransomware must obtain a Private Key to complete the encryption process. Without the private key, ransomware simply doesn’t work. We have been able to identify that exact communication and we block it at the firewall. By doing egress monitoring (which is doing deep packet inspection on traffic leaving the business) we can empirically stop ransomware from encrypting your files.

All of Axiom’s firewalls do egress monitoring, deep packet inspection, SSL DPI, and many other enterprise features. Our business model allows us to send out a fully configured firewall for your business. It is plug and play to install, such as plugging in a wireless router. We then manage it, monitor it and keep you up to date every single day with the new emerging threat definitions. There is no upfront cost for the device, just a monthly subscription for the monitoring and updating. You can save thousands over the cost of other firewalls, installation, configuration and maintenance from our competitors.

Most small businesses can’t afford a full-time IT staff, much less a cybersecurity expert on staff to keep the business protected. Call us today for a free consultation that is specific for your business. Our cybersecurity experts research the latest emerging threats and we update our firewalls each day to keep our clients on the cutting edge of protection. Our firewalls are unique in the fact that they don’t have to be restarted to be updated. Our firewalls are one of small group of security appliances that inspect traffic in both directions, going into and leaving the business.

Call us today for your free consultation.
1-800-519-5070 | www.axiomcyber.com

HACKED! Small Businesses are susceptible to cybercriminals

It’s a chilling moment when a small-business owner discovers hackers have stolen thousands of dollars from the company checking account.

Cybercriminals took an average $32,000 from small-business accounts, according to a December survey of owners by the advocacy group National Small Business Association. And businesses don’t have the same legal protection from bank account fraud consumers have.

The Electronic Funds Transfer Act, passed in 1978, states that it’s intended to protect individual consumers from bank account theft, but makes no mention of businesses. Whether a business is protected depends on the agreement it signs with a bank, said Doug Johnson, a senior vice president with the American Bankers Association, an industry group. If the business hasn’t complied with any security measures required by the agreement, it could be liable for the stolen money, he said.

Any business is vulnerable, but small companies are less likely to have security departments and procedures to guard against online theft than big corporations do. They also don’t have big revenue streams that are better able to absorb losses from a theft. And even if they get the money back, they still have to spend time and money dealing with the hassles of closing accounts and opening new ones.

Sandy Marsico’s company accounts were attacked — twice. Her bank contacted her in December 2014, saying a transfer of over $50,000 to Mexico had been requested from her checking account.

The thieves had obtained the account information; Marsico, owner of Sandstorm Design, a Chicago-based marketing company, still doesn’t know how. The bank did an investigation but didn’t share its findings with her.

Marsico didn’t approve the transfer, the account was closed and a new one opened. But the following November, someone began withdrawing money from the new account in increments ranging from $1,000 to $4,000, a total of $20,000 in the course of a month. Marsico didn’t discover it until she got her monthly statement.

“My stomach dropped when I wasn’t able to identify these as our charges,” Marsico said.

The bank, which again did an investigation but didn’t tell Marsico the results, again reimbursed Sandstorm. Marsico has since moved some of her accounts to another bank.

Thieves are increasingly using realistic-looking emails to trick companies into transferring money from their accounts with what’s known as wire transfers, said Avivah Litan, a security analyst with the research company Gartner. Often, an employee receives an email purportedly from a company executive asking them to transfer the money from the company’s account into a specific external account. If employees don’t check to be sure the request is legitimate, they might go ahead and authorize a withdrawal.

The first attack on Marsico’s account was a wire transfer attempt but didn’t use an email to her company.

The FBI reported in August that more than 7,000 U.S. companies had been victimized in emailed attacks since late 2013, with losses of more than $740 million. The government said the number of identified victims had surged 270 percent between January and August of last year. Most of the thieves are believed to be in organized crime groups in Eastern Europe, the Middle East and Africa.

Source: Joyce M. Rosenberg, The Associated Press

How Can Axiom Cyber Solutions Help?

Axiom Cyber Solutions is offering a Managed Firewall, Cyber-Security Protection for Small Business starting as low as $199 per month. We realize that most small businesses do not have a dedicated IT team and business owners may be handling their cyber security matters on their own. Let us take over and provide you with peace of mind. Axiom will provide your business a firewall and manage it so you don’t have to worry about securing your business. We will assess the security risks for your business and will help implement the right cyber security service for your business. And don’t worry, there are no upfront costs for the device and you can cancel at anytime.

Axiom’s solutions come in different sizes and all our solutions are designed to deal with the attack vectors of today while being adaptive and flexible enough to continue to secure your network for years to come. For more information, check out our website at axiomcyber.com or give us a call today for your free consultation.(800) 519-5070. #FightBackWithAxiom

The $5 Computer

This year when I got my Raspberry Pi 2, I thought it was the best low cost computer I would ever see. Well, the company that makes the Raspberry Pi just showed me how wrong I could be.

The Cambridge U.K. based Raspberry Pi Foundation just turned a $1 million dollar grant from Google into a $5 dollar computer distribution. The PC board is about as quick as an iPhone 4S and has ports for keyboard, mouse, USB, video, and a Wi-Fi dongle. It runs the free Raspbian Linux distribution. Other Raspberry Pi models also run Ubuntu, Kali and even Windows 10 IoT edition.

This platform has brought the cost of computing down to the point that just about everyone can afford to test and tinker with them. We use our Raspberry Pi 2 for a number of things. Our office PBX is a Raspberry Pi 2 running a Linux based Asterisk distribution. My home Raspberry Pi 2 is currently running the RetroPi project which is a distribution of old video games.

As the world embraces the Internet of Things, the Raspberry Pi platform will have a huge impact. Everything from home automation to holographic jukeboxes and everything in between, the IoT will continue to develop with the help of low price of compute.

Read the full article here: http://blogs.wsj.com/digits/2015/11/26/raspberry-pi-rolls-out-5-computer/

The Reality of Internal Denial of Service

The Reality of Internal Denial of Service

Internal Denial of Service            

It’s a term we don’t often hear. An internal denial of service is simply something on the internal LAN that floods the network with traffic causing a loss of connectivity and it happens more than you think.

Sometimes internal denial of service happens by accident as was the case for a client of Axiom’s earlier this year. A switch had gone bad and was multicasting traffic across the LAN to the point that it brought the company’s phones down. Although the phones had their own VLAN, the faulty switch flooded all VLANs making all applications and phones useless.

Imagine a multi-lane interstate. Normal traffic is organized and manageable. When internal denial of service occurs, flooded traffic takes over all lanes and clogs the highway to the point that no one moves. It’s gridlock. In this example, the customer’s internal applications like Email, CRM and ERP were down, the phones were down and their customers from outside could no longer reach the locally hosted web app. It was a nightmare. Everything was down.

Flash forward to this month. We consulted with a private high school. A couple of students decided they didn’t want to take part in exams so they started an application on a workstation that flooded the network with traffic. In this example, the flood again caused the LAN to be saturated with traffic and the online test came to a halt. The students were identified and removed from the school, but the downtime was significant.

This last example is more common. A client had an internal denial of service at the same time that they were being attacked from the outside. Forensic analysis found that an employee’s computer was infected with a malware that remained dormant for months. At some point before an external distributed denial service, an employee clicked a suspicious link and unknowingly became infected with a malware that would later launch the internal denial of service. This act was coordinated by the external group to coincide and took the business out of commission for nearly a week.

The FBI recently stated that 90% of companies would be susceptible to similar malware. (http://read.bi/1vZbFAr) Axiom has found that just as in the case of UK based Internet Service Provider Talk-Talk, DDoS is a precursor to a breach in a large number of cases.

What’s the solution? Axiom has developed next generation denial of service mitigation appliances that stop the internal and external threats of denial of service. By inspecting every packet on the LAN or WAN, our Sentinel is able to respond within 10 milliseconds of an attack. Sentinel will isolate and absorb that traffic so that it cannot affect the rest of your network. Sentinel can mitigate up to 100GB of traffic in a single 1U appliance and can inspect more than 120 million packets per second.

Axiom is on a mission to stop denial of service attacks. Internal, External, Distributed… We have the solution. With the availability of our next generation, multi-core processors and proprietary algorithms we can make DDoS a thing of the past.

Contact us today for a personalized solution discussion regarding your unique use case. Give us a call at 1-800-519-5070

Ransomware On The Rise

Ransomware On The Rise

Imagine the following scenario. You receive an e-mail that appears to be from, for all intents and purposes, your superior. There’s a familiar link to a payroll policy update included and you click to investigate. Soon after, a pop up has appeared on your computer screen informing you that your system and data are locked – and access can only be restored if a payment is made. At this point, you realize that you have been infected with something and the only two options you have are to either pay the ransom, or to ignore it, effectively losing all of the data on your system and/or network.

This is a classic example of digital extortion by ransomware.  Ransomware is defined as a kind of malware that locks your computer screen and prevents you from accessing your data until you pay the “ransom” to the cybercriminal. Money of course is the motivating factor for these cyber criminals and ransomware is only increasing and making it easier for them to follow the money. A report by the Cyber Threat Alliance found that ransomware generated more than 325 million dollars in ransom income. Ransomware is only going to evolve. In fact, ransomware hackers are now threatening to publish your personal files on the web if you do not pay up. The threat of having your personal data and files in the public domain is terrifying for those who possibly have embarrassing or sensitive data.

It should come as no surprise that many businesses will choose to simply pay off the ransom. In fact, recent headlines show that even the FBI is encouraging people to pay up.

Recently, during the 2015 Boston Cyber Security Summit, Joseph Bonavolonta, an assistant special agent in charge of the FBI’s Cyber and Counterintelligence Program in the Boston office stated,

“The easiest thing may be to just pay the ransom. The amount of money made by these criminals is enormous and that’s because the overwhelming majority of institutions just pay the ransom.”

Ransomware relies on the human aspect and programs like antivirus protection are not guaranteed to stop ransomware. The FBI recommends the following tips to help avoid ransomware.

  1. Make sure you have updated antivirus software on your computer.
  2. Enable automated patches for your operating system and web browser.
  3. Have strong passwords, and don’t use the same passwords for everything.
  4. Use a pop-up blocker.
  5. Only download software—especially free software—from sites you know and trust (malware can also come in downloadable games, file-sharing programs, and customized toolbars).
  6. Don’t open attachments in unsolicited e-mails, even if they come from people in your contact list, and never click on a URL contained in an unsolicited e-mail, even if you think it looks safe. Instead, close out the e-mail and go to the organization’s website directly.
  7. Use the same precautions on your mobile phone as you would on your computer when using the Internet.
  8. To prevent the loss of essential files due to a ransomware infection, it’s recommended that individuals and businesses always conduct regular system back-ups and store the backed-up data offline.

However, these tips still offer no guarantee that protects you from ransomware.

Axiom Cyber Solutions offers the Axiom Sentinel, an enterprise firewall and security appliance, to help with ransomware by making sure that criminals have no way to call home. Sentinel makes malware and ransomware communication out of your network impossible, rendering these applications ineffective and unable to encrypt your data. We have identified key transactions in the TCP/IP stack that must occur when a ransomware is executed. This allows us to block ransomware communication in real time.

Ransomware infections will continue to rise and will evolve with new social and technological attack vectors. It’s important for any organization or individual with sensitive data to exercise caution and deploy best practices in securing your network.

Axiom’s solutions come in different sizes and all of our solutions are designed to deal with the attack vectors of today while being adaptive and flexible enough to continue to secure your network for years to come. For more information, check out our website at axiomcyber.com or give us a call us at (800) 519-5070. #FightBackWithAxiom

Axiom researcher Linda Johnston, in Las Vegas, Nevada contributed to this article.