UncommonX Blog

Learn how UncommonX solutions are making a major impact on the industry and our customers. Don’t forget to subscibe to our X Factor Files newsletter to receive the latest news and updates.

Subscribe →
Man using an endpoint device

5 min read

What Does Ransomware Do to an Endpoint Device?

What does ransomware do to an endpoint device? Ransomware attacks have been increasing in number and severity lately — and without awareness of the issue, the problem will only get worse.

Read More

3 min read

What to do during a ransomware attack in 5 steps

Are you wondering what to do during a ransomware attack? The steps you take in the wake of ransomware incidents are crucial for your business...

Read More

5 min read

Do I need legal counsel during a ransomware attack?

If your organization is one of the many that has fallen victim to ransomware, you might wonder “Do I need legal counsel during a ransomware attack?”....

Read More
ransomware lock on keyboard

3 min read

What to Do After a Ransomware Attack

Wondering what to do after a ransomware attack? If you’ve suffered a ransomware incident, time is of the essence. You’ll need to act quickly to...

Read More
lock over text indicating ransomware attack

3 min read

Can EDR stop ransomware?

Wondering if EDR can stop ransomware? Endpoint detection and response (EDR) software is an endpoint security solution that helps guard against...

Read More
threat actor in cybersecurity with hoodie on

3 min read

What is a threat actor in cybersecurity?

These days, businesses face more cyber threats than ever before. The potential sources of a cyberattack range from “script kiddies” using simple...

Read More
connected world

4 min read

What is advanced persistent threat detection?

When it comes to cyberattacks, most people imagine an incident that’s short and intense. Think of script kiddies bringing down your website with a...

Read More