Remember the destruction WannaCry caused? The casualties included up to 300,000 encrypted computers in over 150 countries, not to mention the damage or loss of data entirely. The newest ransomware cyber-attack threat is far worse than WannaCry, and it's going by the name “Petya.”
Posts by Michael Thweatt
Want to improve your cloud operations and take advantage of robust new technology options? Now you can, as you may have heard the news recently about the new partnership between VMware and Amazon Web Services (AWS), called VMware Cloud on AWS. Enterprise Strategy Group (ESG), an IT analysis, research, validation, and strategy firm that provides market intelligence and actionable insight to the global IT community, recently published a technology brief announcing the new joint offering; read on for an overview of its structure and benefits.
The news is buzzing with instances of companies being taken for a ride by cyber thieves. Their new tactic? Injecting dangerous software into the organization and locking their data up until a ransom is paid. While the FBI still recommends not paying the ransom, enterprises are taking varying approaches to combatting ransomware. In this post we dive into some recent ransomware attacks and takeaways your organization can learn from them.
Nearly every day, there is a new cybersecurity breach to announce; businesses should be more alert than ever before. In 2015, the Ponemon Institute and Symantec discovered that a whopping 47 percent of U.S. data breaches were the result of a malicious insider or criminal cyberattack. Read on for an illuminating look into recent high-profile cases, and what you can learn from them.
With the wide range of reported cybersecurity incidents and hackers getting more creative than ever before, there is no shortage of threats to the modern enterprise. IT managers must not only secure current data and systems, but preemptively protect against ongoing future threats, which are constantly evolving. While there are well-known versions of malware, “Tellingly, WatchGuard’s inaugural Internet Security Report found that some 30 percent of malware in Q4 was new, or ‘zero day.’ (Not to be confused with zero-day exploits.) In other words, one-third of malware identified wouldn’t be caught by legacy antivirus solutions,” according to PYMNTS.
Unsecured printing and imaging leads to security breaches, putting organizations at risk of costly lawsuits and public relations nightmares.
Today’s printers can connect to wireless networks, scan and send documents, store data on hard drives, and even produce 3D materials. They have many of the same capabilities—and the same vulnerabilities—as computers. As their features increase, so do the opportunities for security breaches in the printing process.
How good are your enterprise’s security defenses? Today’s hackers have access to an arsenal of tools for carrying out targeted attacks, thanks in part to an anonymous and hidden area of the internet called the Dark Web (also called Deep Web or Darknet). Payment for purchases made there is typically in the international digital currency Bitcoin, which offers a fairly high level of privacy.
The job of an IT professional is challenging, especially since strengthening cybersecurity is constantly a moving target. With attackers trying new approaches and getting stronger with their tactics every day, protecting an enterprise’s data and information is more crucial than ever before. How can you ensure you’re covering all of your security bases? Start with managing the most common security risks, which are described in this article.
Ransomware is a flourishing IT threat, and one that can cost organizations thousands of dollars in lost data, ransomware repayments and security breaches. According to Marcin Kleczynski, the CEO of cybersecurity company Malwarebytes, "In the last six to 12 months, [ransomware] has just gone so aggressively to the business environment. We see companies from 25 people all the way to 250,000 people getting hit with ransomware."
Surely you’ve seen rampant news reports of malware breaches and incidents of cyber hacking at enterprises around the world. From hospital hackings to financial services heists, digital criminal activity is a very real threat in today’s business climate. Read on for the details your enterprise needs to know about malware, in addition to three tips to protect your organization.
If your organization is considering a move to cloud computing, but you are worried about signing up for the proper services for your company, consider test driving the offerings before you make the switch. A well-researched and properly planned cloud deployment is the best strategy for companies seeking to take advantage of this new technology to take, but IT pros may be concerned about potential speed bumps and setbacks.
The concept of “software-defined” is not new, in fact we’ve been replacing hardware with software for a long time. Think about the alarm clock you used in the 90’s. If you wanted to set your alarm clock for 30 minutes earlier than usual you had to rotate through 23 and a half hours to set your new time. But that was normal. Fast-forward to now and your alarm can be turned on, off, or adjusted with a click of a button – right on your mobile device – replacing hardware with a software enabled device.
At least once a year, you can find a report on the web about what the most common passwords are based upon leaked data. Think of these lists as the worst passwords you can ever use. Typically, 123456 and password top the list. Coming up the path of popularity are passwords 123456 and 123456789, as people are required to enter in longer passwords. Need a mix of letters and numbers? You might want to avoid abc123 and trustno1, among many others. Nowadays, a password security alone isn’t sufficient to lock anything down. How best can you secure your system to keep the bad guys out?
Did you know that your data could be compromised at this moment, even if none of your security measures have sounded an alarm? As companies across the nation reported data breaches throughout the past few years, one commonality was noted: in most breaches, the data was compromised for weeks or even months before anyone noticed. When you couple that fact with some of the expectations for data security in the coming years, you realize that both internal and external security in most organizations has to evolve if it’s going to do any good.
Managing internal access to data and software has always been a challenge for technical and security departments. In the past, security was often managed physically; workers couldn’t access what they couldn’t physically get to. Today, cloud computing and the need for employees of all levels to access data from disparate locations makes physical controls outdated in most industries. Instead, organizations are turning to a variety of cloud, software, and hardware-based security solutions, some of which are less effective than others.
An enormous challenge for technical and security departments within any organization is creating secure networks, apps, and servers without making access so difficult that legitimate production is impacted. This is true whether you are working with in-house employee-based systems or customer-facing solutions such as web portals or online account management. The consequences for not securing information are huge, ranging from federal or state sanctions to loss of customers or customer trust. At the same time, results of the wrong type of security or unnecessary security might include loss of productivity, inability to make deadlines or complete work, poor employee morale, and loss of revenues. Data protection is key, but how can you ensure you have the right solutions in place?