Government Technology Insider
  • About
  • State & Local
  • Civilian
  • Defense & IC
SUBSCRIBE
No Result
View All Result
  • Acquisition
  • AI & Data
  • Cybersecurity
  • CX
  • Digital Transformation
  • Hybrid Work
    • Work Smarter
  • Public Safety
  • Resources
    • Technology Trends Shaping the Future of Government
    • World of Work
    • Your Digital Transformation Path Starts Here
    • The Frontlines of Customer Experience
    • Innovative Solutions for Connecting Agencies
    • Be Ready For What’s Next
Government Technology Insider
  • Acquisition
  • AI & Data
  • Cybersecurity
  • CX
  • Digital Transformation
  • Hybrid Work
    • Work Smarter
  • Public Safety
  • Resources
    • Technology Trends Shaping the Future of Government
    • World of Work
    • Your Digital Transformation Path Starts Here
    • The Frontlines of Customer Experience
    • Innovative Solutions for Connecting Agencies
    • Be Ready For What’s Next
No Result
View All Result
Government Technology Insider
No Result
View All Result
Home Cybersecurity

Tycoon Ransomware: What You Need to Know

by Jackie Davis
October 7, 2020
in Cybersecurity, Hybrid Work
Reading Time: 3 mins read
A A
tycoon ransomware
Share on FacebookShare on Twitter

Neutralizing cyber threats is a constant focus for government agencies and for good reason. According to the 2020 BlackBerry Cylance Threat Report, organizations handling technology-software were top ransomware targets and accounted for about 26 percent of attacks. As agencies continue to implement new technology to enable remote work and mission delivery, it is paramount agencies ensure networks are protected from increasing ransomware attacks.

As explained in a recent BlackBerry blog, Tycoon ransomware is a new breed of threat targeting Windows and Linux that agencies need to be aware of. Tycoon ransomware is difficult to detect and uses obscure Java images to stay hidden. Tycoon is targeting public sector organizations and has been a growing problem for educational institutions since its emergence in December of 2019. With colleges, universities, and agencies relying on remote work, organizations must bolster their defense to fend off threats like Tycoon.

“We’ve gone to a world of work from home. And through the last three or four months, we’ve had millions, literally millions of people working from home in all kinds of businesses and industries across the country, which has created, if you stop and think about it, a whole new what we call target space for adversaries. In other words, a whole bunch of new places to attack. Home routers, for example, have become a target of opportunity,” said Maine Sen. Angus King who is the Cyberspace Solarium Commission co-chair in a recent interview.

Since ransomware can have a long dwell time, it’s vital that organizations strengthen their cyber posture to defend against threats. Utilizing security solutions that leverage artificial intelligence, machine learning, and a Zero Trust architecture and steps in the right direction, according to the security experts at BlackBerry.    

“One of my favorite sayings is structure is policy. If you have a messy, uncoordinated, disorganized structure, you’re going to have messy, uncoordinated, disorganized policy. It’s just as simple as that,” said King. “So all of the pieces having the structure, having the planning, having the thinking of the unthinkable and then thinking about solutions and how are we going to solve this can make a huge difference, rather than just ad hoc-ing it trying to deal with a serious problem on the fly without those elements in place.”

Ready to improve your security posture? Click here.

Tags: BlackBerryRansomwaretycoon ransomwareZero Trust

RELATED POSTS

Department of Defense Zero Trust Strategy
Defense & IC

Exploring the New Department of Defense Zero Trust Strategy: A Podcast with Verizon and Zscaler

March 28, 2023
Contributed Articles

What’s Missing from the National Cyber Strategy? Speed, Funding, and Accountability

March 23, 2023
Federal IT Security Solutions
AI & Data

Federal IT Security Solutions: Creating a More Secure and Effective Future

March 10, 2023

TRENDING NOW

  • Advana

    Meet Advana: How the Department of Defense Solved its Data Interoperability Challenges

    9396 shares
    Share 3758 Tweet 2349
  • Exploring the New Department of Defense Zero Trust Strategy: A Podcast with Verizon and Zscaler

    18 shares
    Share 7 Tweet 5
  • Why the Government Needs a Cloud-Native Workforce

    9 shares
    Share 4 Tweet 2
  • The Five Pillars of Zero Trust Architecture

    435 shares
    Share 174 Tweet 109

CONNECT WITH US

Advertisement Banner Ad Advertisement Banner Ad Advertisement Banner Ad
Advertisement Banner Advertisement Banner Advertisement Banner
Advertisement Banner Advertisement Banner Advertisement Banner
Advertisement Banner Ad Advertisement Banner Ad Advertisement Banner Ad
MaaS Nebula Software Factory Banner Ad MaaS Nebula Software Factory Banner Ad MaaS Nebula Software Factory Banner Ad
Advertisement Banner Ad Advertisement Banner Ad Advertisement Banner Ad
Advertisment Banner Ad Advertisment Banner Ad Advertisment Banner Ad
Advertisement Banner Advertisement Banner Advertisement Banner
Advertisement Banner Ad Advertisement Banner Ad Advertisement Banner Ad

BECOME AN INSIDER

Get Government Technology Insider news and updates in your inbox.

Strategic Communications Group is a digital media company that helps business-to-business marketers drive customer demand through content marketing, content syndication, and lead identification.

Related Communities

Financial Technology Today
Future Healthcare Today
Modern Marketing Today
Retail Technology Insider
Today’s Modern Educator

Quick Links

  • Home
  • About
  • Contact Us

Become a Sponsor

Strategic Communications Group offers analytics, content marketing, and lead identification services. Interested?
Contact us!

© 2023 Strategic Communications Group, Inc.
Privacy Policy      |      Terms of Service

No Result
View All Result
  • Home
  • About Government Technology Insider
  • State & Local
  • Civilian
  • Defense & IC
  • Categories
    • Acquisition
    • AI & Data
    • Customer Experience
    • Cybersecurity
    • Digital Transformation
    • Hybrid Work
    • Public Safety
  • Contact Us