Scott N. Schober – BMC Blogs https://www.bmc.com/blogs BMC Software Mon, 19 Nov 2018 12:06:54 +0000 en-US hourly 1 https://blogs.bmc.com/wp-content/uploads/2016/04/bmc_favicon-300x300-150x150.png Scott N. Schober – BMC Blogs https://www.bmc.com/blogs 32 32 Cryptojackers Are Stealing Your Electrons https://www.bmc.com/blogs/cryptojackers-are-stealing-your-electrons/ Tue, 10 Apr 2018 00:00:32 +0000 http://www.bmc.com/blogs/?p=12127 Currency, in all its forms, has thieves that take what is not theirs. Cryptocurrency is no different. The fact that bitcoins are not a physical currency does not stop cybercriminals from stealing them, but these are not the same as cryptojackers. Cryptojackers are out to steal your electrons. Hijackers are bad guys that overtake something […]]]> Breach Recovery Checklist For You And Your Company https://www.bmc.com/blogs/breach-recovery-checklist-for-you-and-your-company/ Tue, 28 Nov 2017 12:49:58 +0000 http://www.bmc.com/blogs/?p=11507 No business or individual is immune to a cyber breach, yet I hear many people say they don’t think they will be affected. They believe that their company does not have anything valuable enough to be stolen, but every company and individual has data that is valuable to a cyberthief that they might overlook. While […]]]> Top 5 Cyber Practices To Keep You Safe https://www.bmc.com/blogs/top-5-cyber-practices-to-keep-you-safe/ Tue, 22 Aug 2017 09:50:28 +0000 http://www.bmc.com/blogs/?p=11099 People assume that staying safe from cyber hackers requires a lot of money. While spending money in the right area is important, common sense features costing little to no money and are the most effective defenses to thwart a cyber attack. Let’s face it, no one is 100% safe from cyber hackers so each of […]]]> The Future of Ransomware https://www.bmc.com/blogs/the-future-of-ransomware/ Thu, 20 Jul 2017 00:15:05 +0000 http://www.bmc.com/blogs/?p=10892 A few years ago, if the average person heard the term ‘ransomware’ they might have imagined the fashion ensemble of a kidnapper. Fast forward to today and most everyone one is now familiar with ransomware one way or another. Most ransomware infects target computers when unsuspecting users click on an attachment or link usually embedded […]]]>