cybercrim

Results 1 - 25 of 335Sort Results By: Published Date | Title | Company Name
Published By: Crowdstrike     Published Date: Jul 01, 2020
There’s no question that ransomware is a growing threat. High-profile attacks that crippled multiple U.S. cities, including Baltimore, Maryland, and Park City, Utah, made headlines in 2019. However, those attacks reflect only the public side of a much larger cybercriminal industry that is constantly innovating its capabilities. In fact, ransomware is one of the fastest growing threats in cybersecurity, with damages predicted to build to $20 billion globally by 2021, up from “only” $345 million in 2015. This paper explains the evolution of ransomware by breaking down the new trends in online extortion threats, and provides prescriptive advice on how to protect and secure your organization against such an attack.
Tags : 
    
Crowdstrike
Published By: Ensign InfoSecurity     Published Date: Jun 19, 2020
2019 was yet another challenging year, as cybercrimes continued to plague enterprises and everyday users of digital technology. Data breaches were reported across multiple industries, which saw some of Singapore’s high-profile organisations hacked, and their sensitive information stolen. The Ensign Cyber Threat Landscape Report 2020 aims to provide you with detailed insights into the most prevalent threats observed in Singapore’s cyber landscape. Through detailed analysis of key security insights and threat intelligence information, the report identifies the cyber threats and trends that Singapore faced in 2019. It also offers threat insights based on the stages of the MITRE ATT&CK® framework, as well as the best practices for safeguarding against cyber threats. Highlights from the report: Details on the top cyber attack vectors Insights into the most targeted industries Top threat attack sources Threat insights based on the stages of the MITRE ATT&CK® framework Analysis of the most
Tags : 
    
Ensign InfoSecurity
Published By: Dell SB     Published Date: Aug 27, 2019
Bon nombre de propriétaires de PME pensent que cela n’arrive qu’aux autres et que leur entreprise est trop petite pour être la cible de piratages, d’attaques par rançongiciel et d’autres types de cybercriminalité. D’autres sont conscients de l’importance de la cybersécurité, mais estiment qu’ils n’ont pas les ressources nécessaires pour en faire une priorité. Ce sont là quelques-unes des raisons pour lesquelles pas moins de 90 % des PME n’ont pas établi de système de protection pour leurs données ou celles de leurs clients.
Tags : 
    
Dell SB
Published By: Cisco EMEA     Published Date: Mar 14, 2018
What if defenders could see the future? If they knew an attack was coming, they could stop it, or at least mitigate its impact and help ensure what they need to protect most is safe. The fact is, defenders can see what’s on the horizon. Many clues are out there—and obvious. For years, Cisco has been warning defenders about escalating cybercriminal activity around the globe. In this, our latest annual cybersecurity report, we present data and analysis from Cisco threat researchers and several of our technology partners about attacker behavior observed over the past 12 to 18 months.
Tags : 
    
Cisco EMEA
Published By: Frontier Communications     Published Date: Dec 22, 2016
This infographic highlights a few common misconceptions about protecting yourself when Mother Nature wreaks vengeance, your workplace becomes a no man’s land, or cybercriminals attack.
Tags : 
    
Frontier Communications
Published By: Cisco     Published Date: Jul 08, 2016
Today’s threat landscape is nothing like that of just 10 years ago. Simple attacks that caused containable damage have given way to modern cybercrime operations that are sophisticated, well-funded, and capable of causing major disruptions to organizations and the national infrastructure. Not only are these advanced attacks difficult to detect, but they also remain in networks for long periods of time and amass network resources to launch attacks elsewhere. Traditional defenses that rely exclusively on detection and blocking for protection are no longer adequate. It’s time for a new security model that addresses the full attack continuum—before, during, and after an attack.
Tags : 
    
Cisco
Published By: Carbonite     Published Date: Apr 09, 2018
Malware that encrypts a victim’s data until the extortionist’s demands are met is one of the most common forms of cybercrime. And the prevalence of ransomware attacks continues to increase. Cybercriminals are now using more than 50 different forms of ransomware to target and extort money from unsuspecting individuals and businesses. Ransomware attacks are pervasive. More than 4,000 ransomware attacks happen every day, and the volume of attacks is increasing at a rate of 300 percent annually.1 According to an IDT911 study, 84 percent of small and midsize businesses will not meet or report ransomware demands.2 No one is safe from ransomware, as it attacks enterprises and SMBs, government agencies, and individuals indiscriminately. While ransomware demands more than doubled in 2016 to $679 from $294 in 2015, the cost of remediating the damage and lost productivity is many multiples higher.3 Ransomware is the equivalent of catastrophic data loss, except
Tags : 
    
Carbonite
Published By: Symantec     Published Date: Aug 15, 2017
Stay ahead of the evolving threats. Organized crime is driving the rapid growth and sophisticated evolution of advanced threats that put entire website ecosystems at risk, and no organization is safe. The stealthy nature of these threats gives cybercriminals the time to go deeper into website environments, very often with severe consequences. The longer the time before detection and resolution, the more damage is inflicted. The risk and size of fines, lawsuits, reparation costs, damaged reputation, loss of operations, loss of sales, and loss of customers pile up higher and higher. The complexity of website security management and lack of visibility across website ecosystems is further impacted by the fact that it is nearly impossible to know how and where to allocate resources. Website security must be evolved in line with these growing threats and challenges.
Tags : 
    
Symantec
Published By: Oracle     Published Date: Aug 02, 2018
Enterprise data protection has grown unwieldy, with systems from various vendors claiming to protect all of an enterprise’s data—and none of them doing a particularly good job of addressing mission-critical data recoverability requirements. It’s a situation that introduces risk and raises concerns about IT’s ability to recover in a timely manner and without data loss from outages caused by cybercrime, system failures, or human error. An integrated strategy that focuses on the complete data recovery needs of an enterprise can eliminate data loss, cut recovery times, and reduce IT complexity—while ensuring data security and positioning the enterprise to seamlessly take advantage of the cloud.
Tags : 
    
Oracle
Published By: Oracle     Published Date: Aug 02, 2018
Enterprises like yours face the growing risk of cyberattacks, which increases your exposure to the risk of data loss. One of the most menacing forms of these is ransomware, where your data is encrypted and literally held ransom—until you pay cybercriminals to release it, or you recover your data from a point in time before your systems were attacked. Such attacks and data losses make headlines —damaging your organization’s reputation. And with new regulations concerning data protection coming into force (such as those introduced by the US Department of the Treasury and the European Union) failing to prepare for a quick recovery from a cyberattack could mean serious financial penalties.
Tags : 
    
Oracle
Published By: MalwareBytes EMEA     Published Date: Nov 20, 2019
Another quarter, another quarterly cybercrime report—our eleventh to date. However, unlike past CTNTs (as we affectionately call them in-house), this time we are zeroing in on a single threat and peeling back its layers to reveal how it has evolved over the last couple years, from attack methods cybercriminals...
Tags : 
cyercrime, threat, ransomware
    
MalwareBytes EMEA
Published By: MalwareBytes EMEA     Published Date: Feb 24, 2020
The healthcare industry was a prime target for cyber criminals in 2019. According to Malwarebytes telemetry data gathered from October 2018 thru September 2019, Healthcare was the seventh most targeted sector in the world, and cybercriminals aren’t slowing their efforts. From Q2 to Q3 in 2019, threat detections increased by 45%. This eBook gives you the facts about healthcare cybercrime in 2019, uncovering: What the most common types of threats were Why healthcare was a primary target How cybercriminals infected healthcare systems
Tags : 
    
MalwareBytes EMEA
Published By: MalwareBytes EMEA     Published Date: Feb 24, 2020
Advances in healthcare technologies have made patient records portable, transferable, alterable, and destructible—for both good and bad actors. The unfortunate truth is that BYOD, the boom of mHealth apps, the cloud, and the lack of awareness among staff have made healthcare cybersecurity more challenging than ever. While the interconnectedness of devices and systems promises to improve operational efficiency and patient care, it also opens the door to cybercriminals armed with sophisticated cyberweapons. The good news is that CISOs, managers, and IT specialists can start addressing these challenges today. This eBook uncovers how each role can reduce risk and increase awareness throughout the organization. And if you fill one of these vital roles, this information is invaluable.
Tags : 
    
MalwareBytes EMEA
Published By: MalwareBytes EMEA     Published Date: Feb 24, 2020
Le secteur de la santé était une cible de choix pour les cybercriminels en 2019. Selon les données télémétriques de Malwarebytes recueillies d’octobre 2018 à septembre 2019, le secteur de la santé était le septième secteur le plus ciblé au monde, et les cybercriminels ne calment pas leurs ardeurs. En 2019, du T2 au T3, les détections de menaces ont augmenté de 45 %. Cet eBook vous présente les faits concernant la cybercriminalité dans le secteur de la santé en 2019, mettant en lumière : Quels étaient les types de menaces les plus courants Pourquoi le secteur de la santé était une cible de choix Comment les cybercriminels ont infecté les systèmes du secteur de la santé
Tags : 
    
MalwareBytes EMEA
Published By: MalwareBytes EMEA     Published Date: Feb 24, 2020
Les progrès des technologies de la santé ont fait que les dossiers des patients sont désormais portables, transférables, modifiables et destructibles, à la fois pour les bons comme pour les mauvais acteurs. La triste vérité est que la pratique BYOD, l’essor des applications de santé mobiles, le Cloud et le manque de sensibilisation du personnel ont fait de la cybersécurité dans le secteur de la santé un défi plus que jamais difficile à relever. Alors que l’interconnectivité des appareils et des systèmes promet d’améliorer l’efficacité opérationnelle et les soins aux patients, elle ouvre également la porte à des cybercriminels dotés d’armes cybernétiques sophistiquées. La bonne nouvelle est que les RSSI, les managers et les spécialistes informatiques ont désormais la possibilité de relever ces défis. Cet eBook met en lumière la façon dont chaque rôle peut réduire les risques et accroître la sensibilisation dans toute l’organisation. Si vous remplissez l’un de ces rôles vitaux, cette inf
Tags : 
    
MalwareBytes EMEA
Published By: Akamai Technologies     Published Date: Dec 11, 2018
Cybercriminals are evolving. Increasingly, they are capitalizing on the open and unprotected nature of the Domain Name System (DNS) to launch damaging phishing, malware, and ransomware attacks. How are you proactively protecting your network and users from these targeted threats? Here are five things to ask yourself as you consider a DNS security solution for your company.
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Dec 11, 2018
It’s likely not a matter of if, but when your company will fall prey to targeted attack involving malware, ransomware, data exfiltration, or phishing. In fact, 70% of organizations reported a security incident that negatively impacted their business in the past year. Learn more about the realities of cybercrime in today’s hyperconnected world.
Tags : 
    
Akamai Technologies
Published By: Delphix     Published Date: May 03, 2016
Data security is a top concern these days. In a world of privacy regulation, intellectual property theft, and cybercrime, ensuring data security and protecting sensitive enterprise data is crucial. Only a data masking solution can secure vital data and enable outsourcing, third-party analysis, and cloud deployments. But more often than not, masking projects fail. Some of the best data masking tools bottleneck processes and once masked, data is hard to move and manage across the application development lifecycle.
Tags : 
    
Delphix
Published By: Akamai Technologies     Published Date: Jun 14, 2018
Cybercriminals are evolving. Increasingly, they are capitalizing on the open and unprotected nature of the Domain Name System (DNS) to launch damaging phishing, malware, and ransomware attacks. How are you proactively protecting your network and users from these targeted threats? Here are five things to ask yourself as you consider a DNS security solution for your company.
Tags : 
dns, phishing, malware, ransomware, security
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Jun 14, 2018
It’s likely not a matter of if, but when your company will fall prey to targeted attack involving malware, ransomware, data exfiltration, or phishing. In fact, 70% of organizations reported a security incident that negatively impacted their business in the past year. Learn more about the realities of cybercrime in today’s hyperconnected world.
Tags : 
cybercrime, security, malware
    
Akamai Technologies
Published By: Key Private Bank     Published Date: Aug 23, 2017
"The latest Key Private Bank whitepaper takes a deeper look at the types, methods and impacts of fraud and identity theft - and how you can prepare and protect your family and your wealth from this growing threat. ©2017 KeyCorp. E89861 170620-248192"
Tags : 
identity theft, fraud, wealth protection, fraud prevention, prepare, cybercrime, cyberattack, phishing, types of fraud
    
Key Private Bank
Published By: Akamai Technologies     Published Date: Aug 11, 2017
It’s likely not a matter of if, but when your company will fall prey to targeted attack involving malware, ransomware, data exfiltration, or phishing. In fact, 70% of organizations reported a security incident that negatively impacted their business in the past year. Learn more about the realities of cybercrime in today’s hyperconnected world.
Tags : 
domain name system (dns), cloud security, threat protection, threat prevention, phishing, ransomware, security threats, malware
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Aug 11, 2017
Cybercriminals are evolving. Increasingly, they are capitalizing on the open and unprotected nature of the Domain Name System (DNS) to launch damaging phishing, malware, and ransomware attacks. How are you proactively protecting your network and users from these targeted threats? Here are five things to ask yourself as you consider a DNS security solution for your company.
Tags : 
domain name system (dns), cloud security, threat protection, threat prevention, phishing, ransomware, security threats, malware
    
Akamai Technologies
Published By: Venafi     Published Date: Aug 07, 2015
It was recently found that most Global 2000 organisations have failed to completely remediate Heartbleed. This leaves these organisations vulnerable to cyberattacks, future brand damage, and intellectual property loss.
Tags : 
cyberattacks, security, cybercriminals, security application
    
Venafi
Published By: Venafi     Published Date: Aug 07, 2015
This paper reveals how not securing all of your keys and certificates enables cybercriminals to bypass controls like threat detection, data protection, firewalls, VPNs, DLP, privileged access, and authentication systems that you expect will mitigate threats.
Tags : 
security, protect keys, security controls, cyber-attacks, cybercriminals, threat detection, data protection, firewalls, authentication, protect digital certificates, reduce risks
    
Venafi
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.