Profile cover photo
Profile photo
IT Security Central
1 follower
1 follower
About
Posts

Post has attachment
RSA Conference 2018: Attend These Insider Threat & Behavioral Analytics Talks
Add a comment...

Post has attachment
Sears, Delta, Best Buy, More?: [24]7.ai Vendor Data Breach Exposes Consumer Data
Add a comment...

Post has attachment
Public Sector Leads Security Innovation: Yet Still Lags Behind
Add a comment...

Post has attachment
Panera Data Breach Exposes Customer Data for 8 Months
Add a comment...

Post has attachment
Data and Cyber Security Challenges: Interview with Michael Osterman
Add a comment...

Post has attachment
Insider Threat Research Reports and Surveys: The Top Facts
Add a comment...

Post has attachment
Business Collective Spotlight on Teramind CEO Isaac Kohen
Add a comment...

Post has attachment
Why IT Compliance Is Critical for Cyber Security

IT compliance is sort of like the forgotten stepchild of cyber security. It doesn’t get as much attention as data breach prevention technologies and policies, even though it is equally important.
Add a comment...

Post has attachment
Zenis Ransomware: It Deletes Your Backups Too

Last year, when WannaCry and NotPetya striked worldwide, many businesses and governments were put on high alert. At the time those ransomware attacks were considered dangerous because they were able to move across networks “laterally” due to the EternalBlue exploit stolen from the NSA. NotPetya was scary for many businesses because it deleted files. Well now is the time to introduce the next terrifying ransomware infecting servers, Zenis. This new ransomware intentionally seeks to not just encrypt files on a server or device but it deletes them and their backups as well. This is one of the first strains of ransomware that intentionally seeks out and destroys backups in addition to the main files.
Add a comment...

Post has attachment
Data Security Best Practices in a Remote Workforce: The Top Experts Speak

Keeping healthy security practices across a globe and diverse workforce is no easy feat. This type of office environment has invoked conversation surrounding keeping and maintaining healthy security practices. It’s easy to dismiss these types of challenges, but it will payoff in the long run to discuss data safety with remote workers. And one could argue that good security hygiene is very important when employees are remote, because remote employees are bringing their own devices (BYOD) and working on public wi-fi.
Add a comment...
Wait while more posts are being loaded