This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
This Website Uses Cookies By closing this message or continuing to use our site, you agree to our cookie policy. Learn MoreThis website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
The 2018 IBM X-Force Threat Intelligence Index has found the number of records breached dropped nearly 25 percent in 2017, as cybercriminals shifted their focus on launching ransomware and destructive attacks that lock or destruct data unless the victim pays a ransom.
According to the Institute for Critical Infrastructure Technology, the healthcare sector fell prey to more cyber incidents through data breaches than any other critical infrastructure area in 2015.
Atlanta city employees coming to work this morning were handed an unusual notice: don’t turn on your computers. The municipal systems had been hit with a ransomware attack on Thursday, and employees were not to use their computer until they were cleared by the municipal IT group.
As ransomware continues to gain notoriety, cybercriminals are looking for more ways to get the most out of the malware that they develop. Similarly, other bad actors who may lack the necessary skills to develop malware themselves are looking for a way to get in on the action. This has led to an increase in ransomware-as-a-service (RaaS), a practice in which cybercriminals put their ransomware up for sale, where it is purchased and leveraged by other criminals who are technically unable to develop their own variants.
How can security operations professionals within healthcare organizations balance the need to meet regulatory mandates while securing critical network infrastructure and patient data?
How are you reducing your IT security risks? Did you know that the global spending on security technology is forecast to reach $81.7 Billion in 2017, according to IDC?
If an organization knows software patches have not been applied and takes no action to remedy the situation, they could be considered negligent and held liable, and suffer significant financial and public relations consequences.