All Security articles – Page 26
-
ebook
Improved Ransomware Recoverability with SafeMode on FlashBlade
One of the biggest challenges in the growing digital economy is the exponential rise in ransomware attacks. Consequences can be dire: pay perpetrators to (they claim) unencrypt your data, stumble with decryption tools, or gamble on recovering from backups. With millions of dollars spent annually to guard entry points ...
-
ebook
Achieve a dependable, secure and manageable multi-cloud
In the majority of organisations, the question of whether to embrace public cloud computing was never a simple choice between that and on-premises infrastructure.
-
ebook
Phishing By Industry 2020 Benchmarking Report
As cybercrime continues to surge, security leaders must understand that there is no such thing as a perfect, fool-proof, impenetrable secure environment.
-
Video
Is Brazil Leading the way in making Data Protection a Fundamental Right?
The Brazilian General Data Protection Law (LGPD) will apply from 15 August and will cover both public and private sectors. It requires all organisations large and small to abide by the same standards and regulations. In addition, a recent Supreme Court ruling (regarding telecoms companies sharing more than 200 ...
-
ebook
Outbound email security essentials
Practically every organization requires secure method of sending emails and transferring files to customers or other contacts.
-
Video
Cyber Security: Employee Awareness in the New Normal
Phishing attacks are often seen as the most damaging and most common threat facing businesses. More people are now working from home and for many, this has the new normal – as a result employees have an increased risk of being targeted.
-
Video
Faking It - Combatting Email Impersonation with AI
Hosted by: Mariana Pereira (Director of Email Security Products, Darktrace) Video: Faking It - Combatting Email Impers…
-
Video
Avoiding the Ransomware Rampage – 5 Key Steps to Staying Secure
Hosted by: Timo Weberskirch (Sales Engineer, Quest KACE) Video: Avoiding the Ransomware Rampage – 5…
-
Video
Data Protection and Cyber Security in Flux Across the GCC
Hosted by: Nick O’Connell (Partner, Head of TMT – KSA), Vivienne Artz, (Global Chief Privacy Officer, Refinitiv), Noriswadi Ismail (Managing Director – Technology, Privacy and Cyber Risk Advisory), Ryan Rubin (Senior Managing Director, Ankura) Video: Data Protection and Cyber Security ...
-
ebook
COVID-19 Reopening Playbook: Privacy, Security, & Technology Best Practices
As more businesses move further into reopening phases, they are placing a priority on understanding what is necessary to keep employees and consumers safe – and feeling safe.
-
Video
Avoiding the Security Dangers with Work From Home (WFH)
As more and more office workers find the new normal to be work from home (WFH) there are challenges and dangers that come into play, with 90+% cyber security attacks beginning with email.
-
Webinar
Protect Ransomware’s Next Target: Backups
Ransomware attacks are accelerating at unprecedented rates, morphing their variants to evade detection, and are now successful targeting your last line of defence - backup copies.
-
Video
Creating a Global Program in an Evolving Landscape
With the ever-changing landscape of data protection, organisations have the task of ensuring their privacy program is adaptable to current and future data privacy regulations across the world.
-
Video
How to Minimise Insider Threats in Cyber Security
Insider threats, whether they are from negligence or those with malicious intent, can pose a significant risk to all organisations. Research from Ponemon Institute reveals that the average cost of insider incidents is almost double the average breach, therefore, companies face a much larger threat from workers than from outside.
-
Video
Ransomware Protection - More Than Just Backup
Hosted by: Adrian Moir (Sr. Consultant, Product Management, Quest Data Protection) Video: Ransomware Protection - More Than Just Backup
-
Feature
Security Concerns over Contact Tracing Apps
When an individual is found to be infected with the coronavirus, the race is on to find those who they have come into contact with, as these people could be carriers or even be infected. This has led to hundreds of coronavirus contact-tracing mobile applications being developed worldwide and backed by various governments and national health authorities, as well as guidelines by the EU and special protocols developed by the two major smartphone OS vendors Apple & Google. In some places, the usage of such applications has been made mandatory for people who want to gain access into public spaces.
-
ebook
Ransomware: Defense in Layer
Organizations need backup software that not only ensures top-level backup and recovery, but also limits the number of entry points for ransomware.
-
Feature
Preparing for the ‘new normal’ in cyber security
The global coronavirus pandemic has added an enormous strain on employees’ ability to work remotely.
-
Feature
Artificial Intelligence: addressing the risks to data privacy and beyond
As more companies are implementing Artificial Intelligence (AI) as a core part of their digital transformation, there is a requirement for boards to focus on the risks related to AI use of personal data and the potential bias and unpredictability in its output.
-
Feature
The Cybercrime Trends and Challenges We Have Faced During COVID-19
It should come as no surprise that since the emergence of COVID-19 last year there has been a month on month increase in the level of malicious activities relating to the pandemic, with cybercriminals using it as a new hook to bait their unsuspecting victims. In actual fact, the overall level of cybercrime in general has not increased dramatically, but many threat actors have jumped at the opportunity to switch from existing lures to those relating to COVID-19.