Security

A company’s data is of the utmost importance, and protecting that data is a big job. Having just the right restrictions on your network (not too little, not too much) is a delicate balance, and new trends such as BYOD are providing unique challenges. These articles cover the implementation of network security at the corporate level, as well as news regarding the latest threats and fixes.


Small Businesses and Ransomware

With ransomware costing organizations more than one billion dollars last year, small and medium-sized businesses can be particularly vulnerable to attacks. It’s important for these organizations to take steps to protect themselves.

SHARE THIS ARTICLE

Big Mac Determines Ransomware’s Demand

A new ransomware plot, dubbed (perhaps appropriately) Fatboy, adjusts its demands based on the price of a Big Mac in the victim’s region. It’s a very rare occurrence of public indexes being used to determine how ransomware presents itself.

SHARE THIS ARTICLE

Facing the Inevitability of Cyberattack

With so much opportunity for cyberattacks, businesses should no longer treat threats as a matter of “if,” but a matter of “when.” The fact is that cyberattacks will happen, and companies must adjust their strategy accordingly.

SHARE THIS ARTICLE

The Cyberinsurance Market Grows

It has been a common complaint among businesses that the insurance industry has not been able to keep up with the pace of cybercrime. However, the market is quickly growing and is already making a positive impact in some industries.

SHARE THIS ARTICLE

It’s Back to Basics for Hackers

A new trend in the cybersecurity landscape is hackers reverting to basic, simple methods of attack. After all, why waste time finding and exploiting complex zero-days when a good old-fashioned phishing e-mail is just as (if not more) effective?

SHARE THIS ARTICLE

Cybersecurity Is National Security

Cybersecurity futurist Dan Geer has some rather grim predictions. Not only is cybersecurity a “paramount national security risk” but also technology is creating a changing world where interdependence is happening faster than we can manage it.

SHARE THIS ARTICLE

What’s Next for Ransomware? Look to the Past

Those who use ransomware to commit cybercrime are always looking for new ways to deploy the attack in order to keep it profitable. So, what’s next? A ransomware expert says that new tactics have their roots in world history.

SHARE THIS ARTICLE

Stay in the Right Cybersecurity Mindset

Too often, companies are not in the right cybersecurity mindset—but it’s a problem that can be fixed. A new report from CompTIA titled The Evolution of Security Skills calls upon on IT security professionals to form more proactive strategies.

SHARE THIS ARTICLE

Is Your Company’s Cybersecurity Training Working?

Companies are under constant threat of data breaches, making cybersecurity training more important than ever. However, some of the training isn’t sticking. Recent studies show that workers still violate security policies in order to remain productive.

SHARE THIS ARTICLE

Collective Attention Threats: How to Respond

A research team from Texas A&M has come up with a plan for how to address so-called collective attention threats before the attacks even start. Read on to see how these threats are crafted and how to respond.

SHARE THIS ARTICLE