Although Bitcoin price dropped substantially this month, cryptocurrencies still attract myriads of swindlers like honey attracts bees. As new waves of users rush into crypto, there will certainly be scammers waiting for them.
Ransomware creates turmoil every day – for individuals and for enterprises. But there is encouraging news. Ransomware, by its very nature, tips its hand with characteristics that make it predictable and recognizable. These distinct features enable advanced security tools to detect and defeat ransomware before files are frozen and ransoms demanded.
Every company uses e-mail to communicate, but few understand that this type of unstructured data needs to be protected. Considering that over 90% of attacks start with e-mail yet only 43% of IT professionals see projects involving unstructured data as a top priority, it’s not surprising that these attacks can cause significant financial damage. Here’s how companies can safeguard against this risk.
Blockchain technology offers a more secure and reliable way of improving cybersecurity in organizations. This article discusses how blockchain-enhanced cybersecurity can help protect organizations from ransomware attacks like WannaCry and Petya.
When it comes to thinking about cyber-attacks, many of the folks running businesses are relying on a heavy combination of faith ("it won't happen to us"), reliance on cyber-insurance ("any losses will be covered"), and the unfounded belief that the long-term consequences won't be that bad ("if it does happen, we'll be back in business in no time"). Alas, every single one of those ideas is simply wrong.
Insurance expert Bill Kelly of Argo Pro provides his insights on the WannaCry ransomware cyber attack and how companies of all sizes can work with insurance providers to find appropriate coverage in order to best protect themselves ahead of the next big cyber attack.
When it comes to the Internet of Things, it’s easy to identify the breadth and depth of the potential value of these connected things. It’s not so easy identifying the threats, risks, and related management solutions. Expert Chuck Brooks gives us his view into how to get a handle on these challenges.
When a company suffers a malware attack, the effects are widespread. Just how far, you ask? To help answer this question, expert Brian Laing explores this topic both far and wide.
Is cybersecurity insurance a necessary evil? Assuming it is, how can organizations make the most of their audit and compliance efforts to get the best coverage and rates possible? Expert Alan Zeichick speaks with experts from multiple angles to see how best to streamline the application process.
Since 2013, Gemalto’s Breach Level Index (BLI) has been used to track data breaches and measure their severity based on multiple dimensions, including number of records compromised, types of data, breach sources, how data was used and whether it was encrypted.
A new Kaspersky report shows criminals are enjoying profit margins of up to 95% on some DDoS attacks. Attackers are also demanding a ransom from a target in return for not launching a DDoS attack, or calling off an ongoing attack. Ben Herzberg from Imperva tells us why you need to pay attention to these stats.
The best defense against growing waves of more intelligent ransomware is an aggressive offense. To ensure that your enterprise is ready, consider these five tips offered up to us by Kyle Bubp.
Great advancements have been made in cyber risk insurance since the first policies were introduced nearly two decades ago. Options available in 2017 offer organizations the ability to not only survive a data breach but the resources and finances to swiftly take it head on and win. Cyber threats have evolved but has your approach to insurance?
What are some easy ways to enhance your iPhone security? Readers will learn how to protect their iPhones and the sensitive information that can be stored on these devices.
2016 was an alarming year for tallying increases in data breaches and analyzing the sophistication of cybersecurity attacks and threats. In this Experts Corner, Chuck Brooks pulls together a collection of links highlighting some of the more alarming cybersecurity statistics.
The founder of “Code Like A Girl” explains the overt sexism she experienced growing up, later in college and in the corporate world merely due to her gender, which made her only more determined to make strides for women who are interested in a tech-oriented career.
An IT security professional realizes that his life’s mission to protect information harks back to being a curious youngster who absconded his teacher’s log-in credentials and then poked around the school’s rudimentary computer network. Little did he know, a rewarding career lay ahead.
Malicious actors are wasting no time in kicking off 2017…in the past week we’ve seen an active and growing ransom campaign against over 10,000 unsecured Internet-facing data MongoDB instances. Here expert Jason Garbis explores this situation a bit more, and then takes a step back for some analysis.
Good Bots. Bad Bots. Can you tell those apart from the ‘normal’ traffic generated by the humans using your network? Sean Martin works with the team at Distil Networks to identify 10 ways to spot bad bots on your network?
Movement of data to cloud-based case management, record searching, research, and platforms introduces risk. Legal firms, no matter the size, must see the importance of protecting the sensitive case information of their clients, especially for ongoing cases, against those who wish to threaten their cybersecurity.