After business, as usual, has been disrupted, the path to stability is a challenging one to negotiate. The steps, timing, and impacts inevitably will vary. Regardless of your organization's state of readiness, it is critical to exercise sound risk management and follow best practices for business resiliency....
The latest edition of the ISMG Security Report features Retired General Keith Alexander, former NSA director, discussing the long-term security implications of the shift to working from home. Also: an update on ransomware gangs leaking data and an analysis of using open source code for app development.
The ransomware threat has scaled up to match the new remote workforce. But have backup policies and incident recovery procedures improved to keep pace?
Download this eBook to learn more about:
Ransomware recovery challenges;
Securing a remote file-sharing environment;
Business continuity successes in crisis...
What should your organization be doing to meet the extraordinary challenges facing IT teams the world over during this time of massive change?
Download this white paper and learn how to:
Shift to a work-from-home model;
Secure a borderless network;
Optimize teams and tool efficiency and achieve overall cost...
The financial services industry sees it all - from credit card fraud to identity theft. To combat these threats, the industry adopts a Zero Trust architecture that also meets consumer and regulatory demands. With Zero Trust in place, you'll improve compliance, visibility and network security.
If security matters...
With the outbreak of COVID-19, the demand for remote work has increased exponentially. Working from home presents a different set of cybersecurity challenges with most home offices having off-the-shelf routers with minimal security countermeasures.
The new remote work and remote learner environments provide...
More ransomware-wielding gangs are not just crypto-locking victims' systems, but also stealing and threatening to leak data unless they get their demanded bitcoin ransom payoff. A growing number of security experts believe the strategy is leading more victims to pay.
Organizations must carefully re-examine their security procedures to make sure they're adequate for the new work-from-home environment during the COVID-19 crisis, says Shelton Newsham, a British law enforcement official who specializes in cybersecurity. He reviews key questions to ask.
If an organization fails to stop a ransomware attack, how does it recover the data? Backups, of course, are essential. But Peter Marelas of Dell Technologies says organizations should have a well-developed strategy for backups because attackers are increasingly targeting those systems as well.
The latest edition of the ISMG Security Report discusses securing RDP to prevent ransomware attacks. Also featured: A look at three likely scenarios for the COVID19 pandemic, and an analysis of why we're still using PINs for certain card payments.
Security experts and law enforcement officials have long argued that paying ransoms doesn't pay. For starters, it directly funds the cybercrime ecosystem and makes it attractive for criminals to keep launching ransomware attacks.
Magellan Health, a U.S. managed care company that focuses on specialty areas of healthcare, says it was hit by a ransomware attack that involved the exfiltration of data. Ransomware gangs are increasingly going beyond encrypting data, stealing information to put more pressure on victims to pay ransoms.
Australian shipping giant Toll Group has vowed to again not pay a ransom after suffering its second ransomware attack of the year. In the latest incident, however, the company warns that attackers also stole corporate data - and it may get leaked.
Many companies around the world have the same problem: how should they cope with the ever-growing amount of data? And how are they supposed to protect all this data? Cloud-based object storage strategy can be used to reduce the costs and long term benefits.
Read this guide to learn:
The rise of object storage and...
According to the results of Frost & Sullivan's Digital Transformation survey, 99% of businesses are engaged in some stage of a Digital Transformation. But the path to Digital Transformation can be challenging:- 57% of IT leaders cite "Insufficient expertise" as a restraint in deploying their Digital Transformation...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.co.uk, you agree to our use of cookies.