The latest edition of the ISMG Security Report features Retired General Keith Alexander, former NSA director, discussing the long-term security implications of the shift to working from home. Also: an update on ransomware gangs leaking data and an analysis of using open source code for app development.
The ransomware threat has scaled up to
match the new remote workforce. But have
backup policies and incident recovery
procedures improved to keep pace?
Download this eBook to learn more about:
Ransomware recovery challenges;
Securing a remote file-sharing environment;
Business continuity successes in crisis...
As organizations around the world have shifted to remote working, security teams are struggling with an unprecedented amount of novel threats originating in the inbox. From stealthy impersonation attempts to domain spoofing attacks targeting concerned teleworkers, traditional security controls are proving ill-equipped...
What should your organization be doing to meet the extraordinary challenges facing IT teams the world over during this time of massive change?
Download this white paper and learn how to:
Shift to a work-from-home model;
Secure a borderless network;
Optimize teams and tool efficiency and achieve overall cost...
The financial services industry sees it all - from credit card fraud to identity theft. To combat these threats, the industry adopts a Zero Trust architecture that also meets consumer and regulatory demands. With Zero Trust in place, you'll improve compliance, visibility and network security.
If security matters...
More ransomware-wielding gangs are not just crypto-locking victims' systems, but also stealing and threatening to leak data unless they get their demanded bitcoin ransom payoff. A growing number of security experts believe the strategy is leading more victims to pay.
Organizations must carefully re-examine their security procedures to make sure they're adequate for the new work-from-home environment during the COVID-19 crisis, says Shelton Newsham, a British law enforcement official who specializes in cybersecurity. He reviews key questions to ask.
If an organization fails to stop a ransomware attack, how does it recover the data? Backups, of course, are essential. But Peter Marelas of Dell Technologies says organizations should have a well-developed strategy for backups because attackers are increasingly targeting those systems as well.
The latest edition of the ISMG Security Report discusses securing RDP to prevent ransomware attacks. Also featured: A look at three likely scenarios for the COVID19 pandemic, and an analysis of why we're still using PINs for certain card payments.
Security experts and law enforcement officials have long argued that paying ransoms doesn't pay. For starters, it directly funds the cybercrime ecosystem and makes it attractive for criminals to keep launching ransomware attacks.
Australian shipping giant Toll Group has vowed to again not pay a ransom after suffering its second ransomware attack of the year. In the latest incident, however, the company warns that attackers also stole corporate data - and it may get leaked.
Many companies around the world have the same problem: how should they cope with the ever-growing amount of data? And how are they supposed to protect all this data? Cloud-based object storage strategy can be used to reduce the costs and long term benefits.
Read this guide to learn:
The rise of object storage and...
According to the results of Frost & Sullivan's Digital Transformation survey, 99% of businesses are engaged in some stage of a Digital Transformation. But the path to Digital Transformation can be challenging:- 57% of IT leaders cite "Insufficient expertise" as a restraint in deploying their Digital Transformation...
As consumers and customers, we are accustomed to easy, intuitive, and superfast transactions driven by data. Therefore, businesses have the various challenges of managing and mining the data they produce and use, but also ensuring that their digital experience is 100% reliable for their customers - so the chain of...
In 2020, most new cyber attacks will come through encrypted traffic.
Currently companies, incl. midsize companies have perimeter-based security appliances. But with data and applications moving into the cloud, and the majority of employees in the network accessing corporate data and applications remotely, the...