3, 2, 1, GO! Make backups of your data!

With the recent proliferation of ransomware, a type of malware that encrypts your data and holds it hostage until payment is received, what should be done to protect valuable data? One of the best defences against this threat is having a good backup strategy. This protects your data against all sorts of unpleasant mishaps. How frequently you…

A new approach is needed in the battle against cyber attacks

How do you search for something that’s invisible? An increase in the sophistication of cyber attacks means that it takes an average of 146 days before a corporate hack is discovered. Modern breaches are a mix of chameleonic deception and clever automation, enabling malicious code to be concealed deep inside the corporate network. In the…

Healthcare IT pros believe data is safer in the cloud

Healthcare IT professionals and executives believe overwhelmingly that when facing hardware malfunctions and environmental disasters, their organization’s data is safer in the cloud than on premises, according to Evolve IP. The survey also revealed a preference for private over public clouds with about 60 percent preferring private cloud infrastructure over public clouds for data security.

BrandPost: Countering the risks of cyberattacks posed by mobile apps

We’ve all become somewhat jaded when hearing about the billions of mobile devices being used by corporate employees and individual consumers (with individual devices increasingly used across both business and personal settings). Somewhat less well known – and still surprising – is the number of mobile apps active in the typical corporation. One recent assessment by Skyhigh Networks found that the average organization uses 1,427 cloud services, each represented…

Will most security operations transition to the cloud?

Companies across industries are increasingly leveraging the cloud for security applications, with 42 percent indicating they currently run security applications in the cloud and 45 percent stating they are likely or extremely likely to transition security operations to the cloud in the future, according to Schneider Electric. Organizations utilize the cloud for existing applications including…

Paying for ransomware could cost you more than just the ransom

Ransomware attacks are now incredibly sophisticated and occurring with increasing frequency.  In fact, many called 2016 “the year of ransomware,” and for good reason: Trend Micro found there were 752 percent more new ransomware families discovered compared to 2015. With the rise of ransomware, it’s very likely that your business will be affected by one of these attacks in…

Double Agent attack can turn antivirus into malware

A zero-day attack called Double Agent can take over antivirus software on Windows machines and turn it into malware that encrypts files for ransom, exfiltrates data or formats the hard drives. Based on a 15-year-old feature in Windows from XP through Windows 10, the attack is effective against all 14 vendors’ antivirus products tested by…

What modern cyber attacks actually look like

Sometimes, your data protection tools may actually be providing a false sense of security. A Venafi survey of 500 CIOs found that they were wasting millions of dollars on cyber security solutions that couldn’t differentiate between malicious and authorized keys and certificates, Information Age reported. As a result, 90 percent of respondents said they expect their organization to…

3 overlooked endpoints for cyber attacks and how to protect them

You probably think you have endpoint security covered. After all, organizations have been securing end-user desktop and laptop computers for decades with anti-virus software and other cyber security programs. Because of these steps, you think you’re not at risk of an endpoint-initiated attack. However, NTT Security’s 2015 Global Threat Intelligence Report found that 70 percent…