logoSign upLog in
Cybersecurity - beBee

Cybersecurity

3K buzzes
Computer security, also known as cybersecurity or IT security, is the protection of information systems from theft or damage to the hardware, the software, and to the information on them, as well as from disruption or misdirection of the services they provide.
Buzzes
  1. John Enright

    John Enright

    28/04/2017
    John Enright
    Global DDoS Threat Landscape: What’s new?
    resources.infosecinstitute.com The Current Global DDoS Threat Landscape In this post, we analyze the current Global DDoS threat landscape focusing on the economic aspect of this kind...
    Relevant
  2. John Enright

    John Enright

    27/04/2017
    John Enright
    Ransomware incidents surge, education a hot bed for data breaches, according to Verizon | ZDNet
    www.zdnet.com Verizon's Data Breach Incident Report for 2017 has a few key takeaways worth noting for healthcare and the education...
    Relevant
  3. John Enright

    John Enright

    27/04/2017
    John Enright
    Top Security Tips for your Wordpress Website
    www.tripwire.com Whenever you talk about WordPress security, every gig hands you a list of security plugins. Emily Johns's point of view and approach are...
    Relevant
  4. John Enright

    John Enright

    27/04/2017
    John Enright
    Healthcare records for sale on Dark Web
    www.csoonline.com A clinic in Baltimore is just one example of a healthcare provider having its records stolen, only to find them on the Dark Web for less than one cent per...
    Relevant
  5. John Enright

    John Enright

    27/04/2017
    10 Steps to Cyber Security John Enright
    Relevant
  6. John Enright

    John Enright

    27/04/2017
    John Enright
    Hackers exploited Word flaw for months while Microsoft investigated
    www.reuters.com To understand why it is so difficult to defend computers from even moderately capable hackers, consider the case of the security flaw officially known as...
    Relevant
  7. John Enright

    John Enright

    27/04/2017
    John Enright
    Will your business be next? Customisable ransomware makes it easy for criminals to target organisations | ZDNet
    www.zdnet.com An easy-to-use form of ransomware is enabling even low-level cybercriminals to tailor attacks against organisations or even individuals with personalised ransom...
    Relevant
  8. John Enright

    John Enright

    27/04/2017
    John Enright
    Ransomware epidemic will continue to ravage healthcare
    www.healthdatamanagement.com While other industries are also vulnerable, providers are being specifically targeted, says Reg...
    Relevant
  9. John Enright

    John Enright

    27/04/2017
    John Enright
    Ransomware, 2017’s key threat - Computer Business Review
    www.cbronline.com 2016 was the year that ransomware became the most serious threat for businesses around the world, and the number of attacks shows no sign of falling in...
    Relevant
  10. John Enright

    John Enright

    27/04/2017
    John Enright
    2017 Global Threat Intelligence Report 77% Of All Ransomware Detected In Four Industries - Business Professional Services Government Health Care And Retail
    www.bsminfo.com NTT Security, the specialized security company of NTT Group, has launched its 2017 Global Threat Intelligence Report (GTIR), which analyzes...
    Relevant
  11. John Enright

    John Enright

    27/04/2017
    John Enright
    Ransomware Attacks: When Is Notification Required? | Lexology
    www.lexology.com Ransomware is one of the most prevalent cybersecurity threats afflicting businesses today. When an attack hits, a victim company must confront...
    Relevant

    Comments

    Kevin Baker
    27/04/2017 #1 Kevin Baker
    follow the links to payment, they come with the back door to take over their server
  12. John Enright

    John Enright

    27/04/2017
    John Enright
    azbigmedia.com Ransomware can threaten the one thing you use the most to propel your business forward, your computer. Here's how to protect...
    Relevant
  13. John Enright

    John Enright

    27/04/2017
    John Enright
    Ransomware Recovery 101: You've Been Hit, Now What Do You Do?
    www.eweek.com More likely than not, your company at some point will experience a ransomware attack. Here's how to prepare a counterattack that will save you in the long...
    Relevant
  14. John Enright

    John Enright

    27/04/2017
    John Enright
    Ransomware could double this year if no action is taken: F-Secure – Tech2
    tech.firstpost.com The growth of ransomware is likely to double in 2017 unless the governments decide to crack down on all potentially illegal payments, a European cyber security firm warned on...
    Relevant
  15. John Enright

    John Enright

    27/04/2017
    John Enright
    Ransomware surge yields big revenue for cyber-extortionists, American targets suffer most: Report
    www.washingtontimes.com Growing pay-offs and a high return rate have made ransomware the most dangerous criminal threat currently facing businesses and consumers connected to the internet, security researchers warned in a new report...
    Relevant
  16. John Enright

    John Enright

    27/04/2017
    John Enright
    Ransomware attacks are taking a greater toll on victim's wallets
    www.itworld.com The hackers spreading ransomware are getting greedier. In 2016, the average fee to free computers hit with the notorious infection rose to $1077, up from $294 the year before, according to security firm...
    Relevant
  17. John Enright

    John Enright

    27/04/2017
    John Enright
    FalseGuide Malware Found in 45 Android Apps - AppInformers.com
    appinformers.com If you have an Android device, you might want to read about the newest malware that was found on Google Play Store. This new issue for Android is called FalseGuide malware, which has been found by the security firm Check Point. This new malware...
    Relevant
  18. John Enright

    John Enright

    27/04/2017
    John Enright
    New Banking Trojan Masquerades as a Flashlight App | CFO innovation
    www.cfoinnovation.com ESET researchers have discovered another banking trojan on Google Play -- this time disguised as a Flashlight widget and targeting a potentially unlimited number of...
    Relevant
  19. John Enright

    John Enright

    27/04/2017
    John Enright
    One in 98 UK Emails Are Loaded with Malware
    www.infosecurity-magazine.com One in 98 UK Emails Are Loaded with Malware. Symantec report claims email-borne threats hit a five-year high in...
    Relevant
  20. Jaime Contreras, MBA, CISM, CISA
    #BreachNews
    Jaime Contreras, MBA, CISM, CISA
    30,000 London gun owners hit by Met Police 'data breach'
    www.theregister.co.uk Who gave marketing agency access to super-sensitive address...
    Relevant
  21. Jaime Contreras, MBA, CISM, CISA
    #BreachNews
    Jaime Contreras, MBA, CISM, CISA
    Millions of game accounts exposed in data breach, responsibility thrown to the wind | ZDNet
    www.zdnet.com If vendor data breach apathy has set in, we're all in...
    Relevant
  22. Jaime Contreras, MBA, CISM, CISA
    #CyberSec
    Jaime Contreras, MBA, CISM, CISA
    Flashpoint - An Analysis of Cybercriminal Communication Strategies
    www.flashpoint-intel.com The ubiquitous usage of encrypted communication tools among cybercriminal communities presents challenges for organizations seeking to combat...
    Relevant
  23. ProducerJohn Enright

    John Enright

    26/04/2017
    DATA SECURITY IS A PEOPLE PROBLEM!
    DATA SECURITY IS A PEOPLE PROBLEM!There are some things that only humans can fix. 95% of all security incidents involve human error. Ashley Schwartau of The Security Awareness Company says that the two biggest mistakes a company can make are “assuming their employees know internal...
    Relevant
  24. Jaime Contreras, MBA, CISM, CISA
    #ITAudit, #CyberSec
    www.azcentral.com PHOENIX -- An audit of the Arizona Department of Economic Security's IT systems revealed weakness and...
    Relevant
  25. Jaime Contreras, MBA, CISM, CISA
    #BreachNews
    Jaime Contreras, MBA, CISM, CISA
    Cybersecurity firm exposed non-anonymized hospital data in demos
    www.scmagazine.com Cybersecurity startup Tanium is in hot water after exposing California Hospital network data during live product demonstrations and online...
    Relevant
See all