The clock is ticking on the General Data Protection Regulation (GDPR) coming into effect and while there isn't wide scale panic yet, lots of organizations are either in denial or just coming to grips with its implications. The difficulty with GDPR is that the regulation states the "WHAT" but pretty much is silent on...
If your organisation processes data for EU citizens, the GDPR will impact you and every department in your company. And any good risk manager knows finding solutions for GDPR-related issues is of the utmost criticality.
That's where our GDPR guide comes in.
Download this whitepaper to find:
A GDPR compliance...
Third party risk management is imperative today for organizations large and small. Senior executives and Boards of Directors are increasingly asking for updates into their vendor risk management programs and looking for demonstrable progress in reducing third party cyber risk.
While Finance organizations tend to...
CryptoLocker. GoldenEye. Locky. WannaCry. It's no secret that 2017 is shaping up to be the most notorious year on record for ransomware. Even a casual news consumer can identify several, if not all, of the menacing ransomware attacks that have cost worldwide businesses an estimated $1 billion this year.
Download...
The vendor-related research focuses on solution providers that are supplying proactive next-generation endpoint security services covering prevention, detection, and response. EMA provided all identified participants the opportunity to participate in a vendor-answered questionnaire and interviews. EMA then combined...
Key gaps in how healthcare entities defend against cybercrime hacking have emerged. Even organizations strictly adherent to HIPAA, NIST or other regulators are still unaware of how their practices compare to their industry peers and whether or not they are lagging behind.
Has your organization assessed and mitigated...
A Belgian security researcher has discovered a "serious weakness" in the WPA2 security protocols used to encrypt many WiFi communications. Attackers can exploit the flaws to eavesdrop as well as potentially inject code such as malware or ransomware into WiFi-connected systems. Prepare for patches.
Artificial Intelligence (AI) and machine learning are among the top industry buzzwords of the year. But how can AI truly make a significant impact on organizations' cybersecurity operations?
Download this eBook that discusses:
The value and limits of traditional AI
Why and how the human element is critical to...
Hackers are targeting organizations of all kinds with malware designed to encrypt crucial data - and hold it hostage until payment is made. So how can you keep your organization's data protected?
Download this whitepaper and learn:
Why ransomware has seen such explosive growth
How to recover encrypted data more...
Organizations can no longer rely simply on signature-based scanning of machines to identify malware. Polymorphic malware takes on an infinite number of forms, making it difficult to identify. And malware doesn't exist for the sake of just existing; it has a purpose in mind that always involves taking something from...
The financial services industry thrives on safety and security - exactly what PINs and passwords are not. They're easily stolen, hacked and forgotten - making them a "double fail" to your customers and your organization. Luckily, there's a better way - biometric authentication, which leading banks are adopting to...
The dark web has become a very effective resource for purchasing sinister educational materials. How-to guides are for sale on major dark web markets such as Hansa and AlphaBay and offer step-by-step instructions for drug trafficking, hacking, social engineering and many other cyber crimes.
Fraud guides, a subset...
Dark web vendors offer a wide range of technological crime. From distributed denial of service (DDoS) attacks to pre-recorded phone calls, there is a myriad of knowledge and listings for hacking & exploits.
In addition to materials for sale, the dark web is also home to a variety of forums designed to build...
What role do employees play in a business's fight against cybercrime? A very important one.
A survey of over 5,000 businesses around the globe found that just over half of businesses believe that they are at risk from within. Meanwhile, careless or uninformed employees contributed to 46% of cybersecurity incidents...
Among SMBs, the average total impact of a data breach amounts to $87,800. For enterprises, it is more than ten times higher at $992,000.
Does your company view IT security as a cost center that must be endured or a strategic investment that ensures business continuity and protection?
Download this eBook and...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing ransomware.databreachtoday.com, you agree to our use of cookies.