{% set baseFontFamily = "Open Sans" %} /* Add the font family you wish to use. You may need to import it above. */

{% set headerFontFamily = "Open Sans" %} /* This affects only headers on the site. Add the font family you wish to use. You may need to import it above. */

{% set textColor = "#565656" %} /* This sets the universal color of dark text on the site */

{% set pageCenter = "1100px" %} /* This sets the width of the website */

{% set headerType = "fixed" %} /* To make this a fixed header, change the value to "fixed" - otherwise, set it to "static" */

{% set lightGreyColor = "#f7f7f7" %} /* This affects all grey background sections */

{% set baseFontWeight = "normal" %} /* More than likely, you will use one of these values (higher = bolder): 300, 400, 700, 900 */

{% set headerFontWeight = "normal" %} /* For Headers; More than likely, you will use one of these values (higher = bolder): 300, 400, 700, 900 */

{% set buttonRadius = '0' %} /* "0" for square edges, "10px" for rounded edges, "40px" for pill shape; This will change all buttons */

After you have updated your stylesheet, make sure you turn this module off

Dan Russell

Recent Posts

Sophos Intercept X stops Ransomware

Sophos Intercept X Overview from Sophos on Vimeo.

We are excited for the upcoming launch of Sophos Intercept X, a next generation of endpoint protection for today’s threats.  Intercept X is Sophos’ new signatureless anti-exploit, anti-ransomware, and anti-hacker technology that includes enhanced reporting and visibility (root-cause analytics) as well as advanced malware cleanup.  All of this managed from Sophos Central.

New ‘Locky’ Ransomware Virus Spreading Rapidly

At Pine Cove we are creating awareness about a cyber threat that is spreading like wild fire.  This blog isn’t intended to scare you, but rather create awareness.  By now I’m sure you have all heard of “Crypto Locker” which was pretty popular a few years ago where someone would click on a link and accidentally download the executable and it would encrypt their files and any mapped drives they had access to.  The only way to recover was to either restore from a backup, or pay the ransom (Sometimes up to $1,000) to get the key from the hacker to un-encrypt the files.

This new variation called “Locky”, takes things to a whole new level.  It was just released last week and stats show that it hit around 60,000 PC’s in the first 24 hours and doubling and tripling daily.  Locky works in a similar fashion where a user clicks on a Word Document received via email titled “Invoice”.  When a user clicks on it, it will tell them they need to enable Macros, once that is clicked the infection begins.  Where this variant differs from the old Cryto Locker is this one spreads.  It will reach out into  your network and any computer it sees, whether its Windows, Mac, or Linux and encrypt the files on it and shared drives.  Similar to Crypto Locker, you either have to pay a ransom to get these files back, or recover from backup and clean up all the infected machines it has spread to.

Things you can do to try and prevent Locky: