Just a couple of days back, media around the world exploded with news of another ransomware attack. Petya, a ransomware wormed its way into information systems in ports, law firms, ad agencies, and supermarkets, besides its favorite victims – firms in the financial and healthcare domains. Its intention, as reported, is to destroy and cause mayhem in the information world bringing businesses to a halt. With systems compromised and data loss, revenue will take a big hit.
It is appropriate to ask now– how did this ransomware attacks computer, and worse, how did it spread? Continue reading
With an increasing number of cyber security breaches affecting notable names, no company would confidently say they are fully protected or prepared to handle a sophisticated cyber-attack. Traditional methods, like anti-malware software, are no longer sufficient to keep sensitive data safe and it is time for automation to beef up cyber security for greater defense.
Recent attacks have been driven by automated bots and such intensive, sustained attacks make it a tough fight to handle the sheer volume and make quick and high-impact decisions to handle these threats efficiently. In these circumstances, security automation has become a powerful and effective component of cyber security incident response in combating the onslaught of incoming threats. Moreover, automation now goes beyond protecting just the technologies, but expanding into applications for IT infrastructure and the enterprise IT environment. From real time monitoring to alerts and incident response planning and investigation, security automation contributes to establishing a comprehensive security envelope for the enterprise. Continue reading
Security breaches have turned to be regular news headlines. And these breaches occur everywhere, from small to big company, and in every industry, from retail to IT.
The threat posed by cyber criminals to critical IT infrastructure and business interest is a dangerous reality of today. It is further worsened by the fact that many businesses operate in different geographical locations. The applications and systems are accessed from multiple devices making businesses more susceptible to cyber threat than ever before. This has made cyber security a critical board room priority now.
The dual security challenges for organizations:
Nobody wants their business to get hit due to security compromise, and many companies are charting out strategies to deal with increasing cyber threats. Continue reading
The financial industry is constantly subjected to a myriad of threats and vulnerabilities. Gone are the days when criminals use to plan for months together in order to execute a bank robbery. Today, banks have stringent security measures that will not let anyone break in easily and walk out with millions of cash easily. But for the criminals, the focus is not on currency anymore. Hackers and cyber criminals plan their crimes from the comfort of their home with just a computer and a keyboard. Consumers have moved to online banking and are doing transactions with digitalized form of currencies. Stealing sensitive data such as credit card information, birthdate, password, and username offers hackers access to a great deal of information with which they can cause irreparable damage to the banks and the consumers. Continue reading
The cyberattacks that happened between 2014 and 2015 affected many large companies and affected millions of consumers. These crimes happened in a matter of seconds and the high profile information hackers stole were sold in the black market within few days. From eBay, Anthem, Target, J.P.Morgan Chase to Staples, Primera Blue Cross, Sony Pictures, and The Home Depot, every company acquired huge losses and suffered severe reputational damage. The list does not stop here. These are just a few names out of a bunch of other large and small companies that were victims of cybercrimes. Continue reading
The Internet of Things (IoT) is all set to explode, driven predominantly by the consumer market, where the number of smart “things” equipped with IP-addressable sensors — from wearable smart bands to smart home monitoring — is multiplying exponentially.
Gartner, a research firm, estimates that 26 billion IoT-ready products will be in service by 2020.
The growth in these connected devices will spike over the next several years, according to numbers accumulated by Cisco Systems. The number of connected systems will grow from 10 billion this year to 50 billion by 2020. What Cisco officials call the Internet of everything will generate $19 trillion in new revenues for businesses worldwide by 2020, and IDC analysts expect the IoT technology and services market to hit $8.9 trillion by the end of the decade and 30 billion will be communicating over the network by 2020.
Storing confidential information on computers calls for a cyber security plan in place. An increase in the rate of sophisticated cyber-attacks and digital spying has made safeguarding of information crucial to organisations. Hackers enjoy a wide scope of opportunities for exploitation given the massive numbers of mobile users, digital applications and data networks.
Automated malware response
Organisations have learned that manual removal of malware from its network is a tough job. With an active automated attack detection mechanism, the damage caused by unauthorised access can be limited on a large scale. With an automated malware response, the time taken for detection can be minimised. The malware can also be removed in real time. Persistent threats to machine speed, which can last for months, calls for quick response and solution. Continue reading
With so much of our everyday communication and commercial activity now taking place via the Internet, the threat from cybercrime is increasing, targeting citizens, businesses and governments at a rapidly growing rate. Continue reading
Over the years there has been a paradigm shift in ways of protecting information. No organization today is completely protected from hostile cyber attacks and organizations must transition from cyber security to cyber resilience. A study by consulting firm PricewaterhouseCoopers revealed that the number of detected cyber attacks increased in 2014. Continue reading