Keys to defending against Ransomware in the Legal, Healthcare and Financial Services industries

Posted by Camden Swita on June 29 2017

NotPetya proves that businesses around the world are not prepared for ransomware.

Ransomware attacks are nothing new, but as recent events have shown, their effectiveness and level of impact have grown. The fact that so many businesses in Russia, Ukraine and the US suffered disruption in operations, loss of business and reputation after the second attack in as many months shows that enterprises continue to lack proper precautions and practices for defending against and successfully responding to ransomware attacks.

Read More

Topics: endpoint encryption, endpoint backup, Ransomware, healthcare, legal, WannaCry, GoldenEye, ransomware defense, NotPetya, financial services

Another Global Ransomware Attack Rocks Russia, Europe – Could Hit U.S.

Posted by Camden Swita on June 27 2017

Fallout from today’s attack could dwarf Wannacry’s

A ransomware attack like May’s Wannacry struck thousands of computers across the world today, taking sensitive data hostage and demanding $300 in Bitcoin per terminal to release it. As of this moment, incidents are concentrated in Russia and Ukraine, but have also been reported in Britain, Romania, the Netherlands and Norway.

Read More

Topics: endpoint encryption, endpoint backup, Ransomware, WannaCry, GoldenEye, ransomware defense

Increased security for legislators

Posted by Camden Swita on June 26 2017

In the wake of last week’s shooting incident at a GOP baseball practice, the House Administration Committee plans to increase funding for members by $25,000 through the balance of 2017 to cover the cost of increased security. This is an important measure, given the increased presence of crowds – and protesters – at many political town halls and Republican events. However, the funding is earmarked for physical security, leaving the issue of cyber security largely unaddressed.

Read More

Topics: data leakage, Data security, Congress, leaks

Everyone Wants Unrestricted Access to Technology

Posted by Camden Swita on June 19 2017

The Washington Post reported recently that “President Donald Trump has been handing out his cellphone number to world leaders and urging them to call him directly, an unusual invitation that breaks diplomatic protocol and is raising concerns about the security and secrecy of the U.S. commander in chief’s communications.”

Read More

Topics: Anywhere Access, Data security, IoT, Donald Trump

007's data security strategies

Posted by Camden Swita on June 14 2017

Government agencies throughout the world are bolstering data security strategies in the wake of intelligence leaks and possible election meddling in the US and elsewhere. The UK Government Communications Headquarters (GCHQ) is no exception. The Queen has tasked the agency with managing a new National Cyber Security Center and combating cyberthreats to the national infrastructure, utility grids and healthcare systems.

Read More

Topics: Anywhere Access, Access Control, DRM, Data security, malware

3 under the radar Data Security threats

Posted by Camden Swita on May 29 2017

There are dozens of ways your data can be compromised. Many are well known and well documented. Here are a few that aren’t:

Unexpected members of the IoT

We usually think of explicitly connected, smart devices as making up the Internet of Things. Laptops, desktops, phones, and so on. But what about a refrigerator?

Read More

Topics: Data Privacy, IoT, in-memory attacks

WannaCry deadline comes and goes - what's next?

Posted by Camden Swita on May 22 2017

One of the biggest stories of the month, the worldwide WannaCry ransomware attack, exposed the massive vulnerabilities to cyberattacks present at organizations across the globe. Malicious software took advantage of weaknesses in commonly run software, impacting hundreds of thousands of computers.
Read More

Topics: Ransomware, WannaCry, Data security, Adylkuzz

WannaCry deadline approaches - get ready for the next one

Posted by Camden Swita on May 19 2017

One of the biggest stories of the week, the worldwide WannaCry ransomware attack, continues to gain momentum as the payment deadline approaches. The malicious software took advantage of vulnerabilities in commonly run software, impacting hundreds of thousands of computers across the globe.

According to the New York Times, “Early estimates of what the virus could ultimately earn had ranged into the tens of millions or even hundreds of millions of dollars. Victims have seven days to pay from when their computers were originally infected, so the deadline will vary from case to case.”

Read More

Topics: endpoint backup, Ransomware, WannaCry

"The Big One": countless computers in nearly 100 countries hijacked by ransomware

Posted by Camden Swita on May 12 2017

Hackers exploit vulnerability stolen from NSA

The destructive power of ransomware was on full display today across nearly 100 countries worldwide, including the US, China Great Britain, Russia and Japan. Affected computers at countless organizations, including the UK’s National Health Service, displayed a message demanding $300 in Bitcoin to unlock stored data.

Read More

Data breaches are a lot like climate change

Posted by Camden Swita on April 18 2017

Data breaches and climate change are a lot alike. Preventing either requires enough people to care about mistakes made one, two, or ten years ago and to change their daily habits to help prevent a growing, if hard to define, problem.

“Information security is a race between peak indifference to surveillance and the point of no return for data-collection and retention,” Cory Doctorow wrote in a recent article on BoingBoing. “The unprecedented leaks in 2016 were not (merely) the result of data gathered last year; much of that data was gathered in the decades [before] this one, inadequately secured and treated as so inconsequential that Yahoo allowed the NSA to backdoor a billions-strong silo filled with data its customers had not even realized they were filling.”

Read More

Topics: endpoint data protection, data breach, newsletter, data in motion, data at rest, corporate data, Corporate theft, climate change

Free White Paper: 6 Essentials For 100% Secure Enterprise File Sharing

Subscribe To The Blog By Email

Blog Topics