Information Security Threats to Small And Medium Sized Businesses.mov

JON RAMSEY | 104 views

Security leaders explain why small and mid-sized businesses are being attacked by cyber criminals such as hacktivists and being targeted for security breaches like espionage

Spotlight

Radiant Logic

As the market leader for identity virtualization, Radiant Logic delivers simple, logical, and standards-based access to all identity within an organization. The RadiantOne federated identity service enables customizable identity views built from disparate data silos, federating identity within the enterprise and building a single global identifier. This technology drives critical authentication and authorization decisions for WAM, federation, and cloud deployments. Organizations in a wide range of sectors—including government, defense, banking, and manufacturing—rely on RadiantOne to deliver quick ROI by reducing administrative effort, simplifying integration tasks, and building a flexible infrastructure to meet changing business demands. Radiant Logic's solutions have been used to solve tough identity and data integration problems at companies around the world. Organizations such as British Petroleum, Comcast, Wells Fargo, Defense Information Systems Agency, Federal Reserve Bank, Sony

OTHER ARTICLES
PLATFORM SECURITY

Security by Sector: Improving Quality of Data and Decision-Making a Priority for Credit Industry

Article | October 12, 2022

The subject of how information security impacts different industry sectors is an intriguing one. For example, how does the finance industry fare in terms of information security compared to the health sector, or the entertainment business? Are there some sectors that face greater cyber-threats and risks than others? Do some do a better job of keeping data secure, and if so, how and why?A new study of credit management professionals has revealed that improving the quality of data and decision-making will be a top priority for the credit industry in the next three years. The research, from Equifax Ingnite in collaboration with Coleman Parkes, takes a deep dive into the views of credit management pros across retail, banking, finance and debt management/recovery sectors.

Read More
PLATFORM SECURITY

3 Trends in Data Privacy Breach Laws That Will Carry Over to 2020

Article | July 11, 2022

During 2019, new privacy laws were introduced, and many current laws evolved in the United States and across the global landscape. With the General Data Protection Regulation (GDPR) in full effect, we saw expensive fines levied upon companies that fell victim to data privacy breaches. As we move into a new year, probably the biggest takeaway from 2019 is that being proactive and having a data privacy strategy in place is important to help mitigate the risk of a data privacy breach. The regulatory landscape continues to evolve as states and countries actively pass new expanded requirements for privacy and cybersecurity regulations. While laws in the U.S., like the California Consumer Privacy Act (CCPA), are getting significant attention, many other states and countries are actively amending their breach notification laws to include tighter restrictions.

Read More
SOFTWARE SECURITY

Ryuk: Defending Against This Increasingly Busy Ransomware Family

Article | July 8, 2022

On December 16, 2019, the U.S. Coast Guard disclosed a security incident at a facility regulated by the Maritime Transportation Security Act (MTSA). Forensic analysis suggests that the incident might have begun when an employee clicked on a link embedded in a phishing email.This action enabled a threat actor to set Ryuk ransomware loose on the facility’s network. Ultimately, the infection spread to all IT network files, leading Ryuk to disrupt the corporate IT network and prevent critical process control monitoring systems from functioning properly. Phishing is one of the primary infection vectors for most ransomware families, but there’s an interesting twist with this particular family. As noted by Malwarebytes, a typical Ryuk attack begins when a user opens a weaponized Microsoft Office document attached to a phishing email. Opening the document causes a malicious macro to execute a PowerShell command that attempts to download the banking trojan Emotet. This has the ability to download additional malware onto an infected machine that retrieves and executes Trickbot.

Read More

New Ransomware hitting Industrial Control Systems like a nuclear bomb

Article | February 10, 2020

Researchers at security firms including Sentinel One and Drago’s have been mystified by a piece of code named Ekans or Snake, over the last month. Drago’s publically released its full report on Ekans Ransomware that has recently inflicted Industrial Control Systems and these are some of the most high-value systems that bridge the gap between digital and physical systems. In the history of hacking, only a few times a piece of malicious code has been marked attempting to intrude Industrial Control Systems. Ekans is supposed to be the first Ransomware with real primitive capability against the Industrial Control Systems, software, and hardware used in everything from oil refineries to power grids. Researchers say this ransomware holds the capability to attack ICS by Honeywell and GE as well.

Read More

Spotlight

Radiant Logic

As the market leader for identity virtualization, Radiant Logic delivers simple, logical, and standards-based access to all identity within an organization. The RadiantOne federated identity service enables customizable identity views built from disparate data silos, federating identity within the enterprise and building a single global identifier. This technology drives critical authentication and authorization decisions for WAM, federation, and cloud deployments. Organizations in a wide range of sectors—including government, defense, banking, and manufacturing—rely on RadiantOne to deliver quick ROI by reducing administrative effort, simplifying integration tasks, and building a flexible infrastructure to meet changing business demands. Radiant Logic's solutions have been used to solve tough identity and data integration problems at companies around the world. Organizations such as British Petroleum, Comcast, Wells Fargo, Defense Information Systems Agency, Federal Reserve Bank, Sony

Related News

Hacker group lauded for improving Taiwan's information security

April 28, 2016

Taipei, April 25 (CNA) Vice Premier Duh Tyzz-jiun (杜紫軍) said that the Hacks in Taiwan (HIT) association has helped enhance Taiwan's information security technology and talent cultivation by holding activities and forums and the government should certainly extend its support to it.

Read More

UK man charged with hacking Federal Reserve

February 27, 2014

A British man faces new charges in the U.S. for allegedly hacking into the Federal Reserve Bank's servers and stealing names, email addresses and other personal information of the bank's computer users.

Read More

Supervalu Says Hackers May Have Stolen U.S. Customers’ Data

August 16, 2014

Supervalu Inc., a U.S. supermarket chain concentrated in the Midwest, suffered a data breach that exposed customers’ payment-card information, marking the latest hacker attack on the retail industry.

Read More

Hacker group lauded for improving Taiwan's information security

April 28, 2016

Taipei, April 25 (CNA) Vice Premier Duh Tyzz-jiun (杜紫軍) said that the Hacks in Taiwan (HIT) association has helped enhance Taiwan's information security technology and talent cultivation by holding activities and forums and the government should certainly extend its support to it.

Read More

UK man charged with hacking Federal Reserve

February 27, 2014

A British man faces new charges in the U.S. for allegedly hacking into the Federal Reserve Bank's servers and stealing names, email addresses and other personal information of the bank's computer users.

Read More

Supervalu Says Hackers May Have Stolen U.S. Customers’ Data

August 16, 2014

Supervalu Inc., a U.S. supermarket chain concentrated in the Midwest, suffered a data breach that exposed customers’ payment-card information, marking the latest hacker attack on the retail industry.

Read More

Events