Apple patches huge security hole (after hackers exploit it)

Posted by Camden Swita on July 24 2017

Security researcher Exodus Intelligence recently exposed a critical vulnerability in iOS devices and Mac computers that would allow a hacker to access passwords and other information via WiFi.

The vulnerability, called Broadpwn, stems from a bug with the Wi-Fi chipsets in Apple devices. It allows an attacker within range to execute arbitrary code on the target device, access passwords and other files stored on memory and in the cloud. The National Vulnerability Database, published by the National Institute of Standards and Technology, rates the vulnerability as a 9.8 out of 10 on its severity meter, putting it well into the critical range.

Read More

Topics: Mobile Content Management (MCM), Mobile File Sharing, Broadpwn, mobile data security, mobile device management, mobile data encryption, mobile device security

Future cyber attack could be as destructive as superstorm sandy

Posted by Camden Swita on July 18 2017

A future global cyber attack could cause as much economic damage as a major natural disaster like 2012’s Superstorm Sandy, cyber insurance provider Lloyd’s of London wrote in a recent report.

Economic losses could soar to $53 billion and beyond worldwide following an attack on a major cloud service provider, the study, co-written by Lloyd’s and risk-modeling firm Cyence, found.

Read More

Topics: endpoint encryption, endpoint data protection, encryption, endpoint backup, Data security, malware, NotPetya

How It's Made: A Ransomware-riddled Network

Posted by Camden Swita on July 13 2017

A closer look at NotPetya actions after it infected one endpoint

There’s been a lot of talk about how NotPetya made it onto corporate networks in late June. There were two main vectors: attachments in phishing emails and an infected update from tax software made by a Ukrainian company. But how did the ransomware spread after it infected just one endpoint? It had two options: the “flat network” exploit and the “stolen NSA tech” path. The former seems to have been the one most frequently used.

Protect yourself against ransomware

Read More

Topics: Announcements, endpoint encryption, endpoint data protection, encryption, Russia, endpoint backup, Ransomware, update, Data security, malware, ransomware defense, NotPetya, ukraine

Webinar: how to be ready for ransomware and sleep at night

Posted by Camden Swita on July 5 2017

A ransomware attack can cause irreparable damage to your reputation and the health of your organization. A single compromised workstation containing sensitive intellectual property or customer data can be equal to hundreds of thousands or even millions in damages.

Read More

Topics: Announcements, Ransomware, WannaCry, ransomware defense, NotPetya, webinar

“SUPERWEAPON” RANSOMWARE BUILT TO SPREAD, CAUSE DAMAGE, NOT MAKE MONEY

Posted by Camden Swita on June 30 2017

As details emerge about the ransomware behind this week’s global attack, NotPetya, one fact is becoming clear: ransomware is becoming more advanced, destructive and harder to kill—weaponized, if you will.

A report on June 30 by Forbes details just how nasty—and sophisticated—the attack was. Experts are saying it’s more of a “superweapon” designed to wreak havoc, spread fast and damage infected machines than a cash-grabbing tool.

Read More

Topics: Announcements, endpoint encryption, endpoint data protection, encryption, Russia, endpoint backup, Ransomware, update, Data security, malware, ransomware defense, NotPetya, ukraine

Keys to defending against Ransomware in the Legal, Healthcare and Financial Services industries

Posted by Camden Swita on June 29 2017

NotPetya proves that businesses around the world are not prepared for ransomware.

Ransomware attacks are nothing new, but as recent events have shown, their effectiveness and level of impact have grown. The fact that so many businesses in Russia, Ukraine and the US suffered disruption in operations, loss of business and reputation after the second attack in as many months shows that enterprises continue to lack proper precautions and practices for defending against and successfully responding to ransomware attacks.

Read More

Topics: endpoint encryption, endpoint backup, Ransomware, healthcare, legal, WannaCry, GoldenEye, ransomware defense, NotPetya, financial services

Another Global Ransomware Attack Rocks Russia, Europe – Could Hit U.S.

Posted by Camden Swita on June 27 2017

Fallout from today’s attack could dwarf Wannacry’s

A ransomware attack like May’s Wannacry struck thousands of computers across the world today, taking sensitive data hostage and demanding $300 in Bitcoin per terminal to release it. As of this moment, incidents are concentrated in Russia and Ukraine, but have also been reported in Britain, Romania, the Netherlands and Norway.

Read More

Topics: endpoint encryption, endpoint backup, Ransomware, WannaCry, GoldenEye, ransomware defense

Increased security for legislators

Posted by Camden Swita on June 26 2017

In the wake of last week’s shooting incident at a GOP baseball practice, the House Administration Committee plans to increase funding for members by $25,000 through the balance of 2017 to cover the cost of increased security. This is an important measure, given the increased presence of crowds – and protesters – at many political town halls and Republican events. However, the funding is earmarked for physical security, leaving the issue of cyber security largely unaddressed.

Read More

Topics: data leakage, Data security, Congress, leaks

Everyone Wants Unrestricted Access to Technology

Posted by Camden Swita on June 19 2017

The Washington Post reported recently that “President Donald Trump has been handing out his cellphone number to world leaders and urging them to call him directly, an unusual invitation that breaks diplomatic protocol and is raising concerns about the security and secrecy of the U.S. commander in chief’s communications.”

Read More

Topics: Anywhere Access, Data security, IoT, Donald Trump

007's data security strategies

Posted by Camden Swita on June 14 2017

Government agencies throughout the world are bolstering data security strategies in the wake of intelligence leaks and possible election meddling in the US and elsewhere. The UK Government Communications Headquarters (GCHQ) is no exception. The Queen has tasked the agency with managing a new National Cyber Security Center and combating cyberthreats to the national infrastructure, utility grids and healthcare systems.

Read More

Topics: Anywhere Access, Access Control, DRM, Data security, malware

Free White Paper: 6 Essentials For 100% Secure Enterprise File Sharing

Subscribe To The Blog By Email

Blog Topics