BlackFog Logo

FAQs

Does the mac agent work on an iPad?

No. To get the best protection BlackFog has designed each agent to work natively on each operating system. It is highly optimized to leverage the hardware using low level API’s. A specific version that operates on iPads will be available soon.

2025-02-04T17:06:52+00:00February 4th, 2025||

Why does it need so many clicks to install on macOS?

Apple takes security and privacy very serious. As a result they demand full disclosure when a product requires elevated permissions or installs system extensions like BlackFog requires. When you manually deploy the mac edition you will be asked to approve 3 things. Installation of a system extension Activate the network extension, and finally Allow [...]

2025-02-04T16:48:50+00:00February 4th, 2025||

Why did it take so long to get the macOS edition feature parity with Windows?

The macOS platform has undergone many changes over the last few years that has now made it possible to provide similar functionality to our Windows platform without reverting to raw kernel drivers. Apple has introduced system extensions that can be managed and deployed more seamlessly within the enterprise. We also took the opportunity to [...]

2025-02-04T15:33:56+00:00February 4th, 2025||

Is the motive always financially focussed?

While financial gain is usually the primary motivation driving large cybercrime groups, some may also have political or ideological motives beyond just monetary profits. However, most large, sustained cybercrime operations still require substantial funding to cover operational costs. So even for groups with additional non-financial goals, the financial aspect of their activities remains very important [...]

2024-06-17T19:51:01+01:00June 17th, 2024||

Do these groups engage in research and development?

More sophisticated, well-funded cybercrime groups do dedicate some resources towards research and development activities. This could include developing new exploits, evasion techniques, malware variants and updating toolkits based on emerging threats and weaknesses that get detected.

2024-06-17T19:50:30+01:00June 17th, 2024||

Why do some groups become bigger than others?

Some groups are able to become bigger due to their success and profits. Groups that are particularly successful at compromising systems, stealing data or funds are likely to reinvest those profits into expanding their operations. This enables them to take on more projects and recruit/pay more members. Large groups may also be able to dedicate [...]

2024-06-17T19:51:45+01:00June 17th, 2024||

How can I respond to ransomware?

Having a clear, comprehensive ransomware response plan is essential for any business. This should include details on what everyone's responsibilities are, how to make and recover backups and what reporting steps are required.

2025-06-22T16:12:41+01:00May 20th, 2024||

Should I pay a ransomware demand?

Law enforcement agencies in the US and UK advise against paying ransomware demands, as this provides further encouragement to cybercriminal gangs. Businesses that do are more likely to come under further attack than those that refuse.

2024-05-20T23:04:58+01:00May 20th, 2024||

What are the costs of ransomware?

Costs for ransomware include direct lost business, ransomware payments, recovery expenses, investigation and future mitigation, fines from regulators and class action lawsuits. In 2023, this added up to an average total of $5.13 million, compared with $4.45 million for data breaches as a whole.

2024-05-20T23:03:29+01:00May 20th, 2024||