2016 Ponemon Cost of Data Breach Study – The less obvious conclusions

August 21, 2023

The 11th edition of the 2016 Ponemon Cost of Data Breach Study presents an in-depth analysis of the cost of…

Eating out – no longer safe if you pay by card

August 21, 2023

Restaurants were not avoided by hackers in 2016, and the reason why is quite obvious: big restaurant chains run their…

Common ways of stealing data: Access token theft

August 21, 2023

Nowadays, 41 records are lost every second in data breaches usually caused by external attackers (according to Breachlevelindex), and the…

HIPAA: Can you prove your data has NOT been compromised?

August 21, 2023

Proof, rarely a concern Proof that the data was safe at a particular point in time is rarely a concern…

Common ways to steal data: Clear-text password dumps.

August 21, 2023

When counting lost records officially reported so far in 2016 in the US, 3.2 out of 4.7 Million were stolen…

File integrity monitoring – Are you doing it properly?

August 21, 2023

The integrity of system and configuration files of various services and applications is critical for building and maintaining secure IT…

Ransomware stories – Petya, the odd one out

August 21, 2023

What is Petya and how is it different from other ransomware? Petya ransomware is meant to prevent users from accessing…

Data breach statistics for H1 of July 2016: Insider vs. ransomware

August 21, 2023

The first two weeks of July were rich in data breaches, especially in the healthcare sector. According to official reports…

Automatic ransomware detection available soon in TEMASOFT FileMonitor

August 21, 2023

Ransomware is already pandemic and there isn't a cure yet. Why? Mainly because ransomware attacks are relatively easy to devise…