In our previous blogs, we have looked at ways through which ransomware moves from being malware used by cyber criminals…
Ransomware has been a growing concern since the last couple of years as the rate and cost of the related…
Until recently, ransomware attacks used to be carried out by highly skilled, well-motivated professional cyber attackers. The primary purpose was…
Almost 3,000 patient appointments and several operations were canceled at three hospitals after a cyber attack involving a variant of…
The European Data Privacy Directive (Directive 95/46/EC of the European Parliament), is still the data privacy law in effect today…
Last weekend brought unpleasant surprises for the customers of Tesco Bank, the banking system of a major retailer in the…
Healthcare organizations in the US fall under the scope of the “Health Information Technology for Economic and Clinical Health (HITECH)…
Skype is a popular communication platform, so companies who are concerned with data security, compliance and assessing the risk of…
Monitoring and analyzing how files are being accessed, how they change, and how they move around the IT environment brings…