The University of Hertfordshire has sustained a cyber incident that severely affected students' online classes and an assignment submission portal. The university, however, notes the incident did not lead to data theft.
As times change, many companies and organizations have worked on ramping up their multi-faceted security defenses. However, threat actors and cyber criminals also adapt and hunt for new vulnerabilities, compromising data by embracing new exploits to ensure substantial financial payoff.
In this report, we...
Moving data internally and between partners requires the safest, most secure method to guard against data breaches. That’s even more important in todays “new normal” where the threat landscape has changed where work from home employees face new risks and challenges with your company data.
Using data classification helps you regain control over your unstructured data. By involving your users in data classification, they will automatically become more data-aware, with a greater understanding of your policies and the value of your organisation’s data.
This whitepaper will take you through the 5 steps...
In this whitepaper, we look at how the threat landscape has changed for businesses, the drivers behind the change – both technical and cultural, and the challenges involved in managing, controlling and protecting data. We then introduce a data-centric approach to security which
involves users themselves in...
Download this whitepaper to know more about paper-based classification policies, automated and user-driven data classification, how to prepare for a data classification project, the peripheral benefits of involving the user in security and more.
The latest edition of the ISMG Security Report features an analysis of recent “tell-all” interviews with members of ransomware gangs. Also featured: insights on securing IoT devices and mitigating insider threat risks.
Criminals continue to target on-premises Microsoft Exchange servers that have not yet been updated with four critical patches, including for a ProxyLogon flaw, which is now being targeted by Black Kingdom ransomware. One expert describes the attack code as being "rudimentary and amateurish" but still a threat.
Canadian IoT device manufacturer Sierra Wireless reported Tuesday it had suffered a ransomware attack over the weekend, forcing it to halt production. The attack has disrupted its website and some internal operations.
Acer, one of the world's largest PC and device makers, has been targeted by the ransomware gang REvil, aka Sodinokibi, according to news reports. The Taiwanese company has not confirmed it has been attacked, but data has been posted to the gang's darknet site.
Prevent attackers from getting a step ahead - watch on your own time this on-demand webinar where you’ll learn from the team that discovered the Golden SAML attack vector back in 2017 – an innovative technique now seen used for the first time in the SolarWinds attack.
This edition of the ISMG Security Report features an analysis of the Microsoft Exchange on-premises server hacks – from who might have leaked the vulnerability exploits to how ransomware gangs are taking advantage of the flaws. Also featured: Tackling the cybercrime business model; assessing "zero trust."
Endpoints used to be safely operated behind a network perimeter. However, the rapid growth of remote access to corporate resources, cloud-based applications, and social media by desktops, laptops, smartphones, and tablets means that the endpoint is now the new perimeter. Endpoints are being attacked in a variety of...
As threats of attacks and breaches grow in sophistication, it is more important than ever for both Security and IT functions to have a unified approach to security.
According to a commissioned study conducted by Forrester Consulting on behalf of VMware, consolidated IT and Security strategies lay a foundation for...