Global Cybersecurity League Formed to Fight Hospital Ransomware

cointelegraph | April 02, 2020

Global Cybersecurity League Formed to Fight Hospital Ransomware
A crack team of cybersecurity experts in 65 countries has come together to combat ransomware attacks on hospitals during the coronavirus crisis. Calling themselves the COVID-19 CTI League the community of experts aims to protect the technological infrastructure of front-line medical resources from cyberattacks. Hospitals around the world have seen a big increase in cyberattacks over the past year, in which critical IT systems are encrypted with malware. Gangs demand a Bitcoin ransom in return for the decryption key. Hospitals are often seen as soft targets, due to ageing IT infrastructure and a willingness to pay due to the critical nature of their work. Cointelegraph reported on March 30 that Ryuk ransomware continues to target hospitals and healthcare providers based in the United States.

Spotlight

DDoS attacks against financial firms have continued to grow in size and frequency. The specific tactics and sophistication of the attacks have evolved rapidly. Outages have prevented customers and prospects from opening new accounts, viewing account and billing information, conducting online transactions and accessing brand and product information. In other cases, while sites have technically been available during an attack, DDoS defense measures have caused response times to degrade up to 30 to 50 seconds, making sites effectively down from an end-user perspective.

Related News

New Security Challenges for Organizations Having Larger Remote Workforces

Tripwire | August 18, 2020

At the outset of the global coronavirus 2019 (COVID-19) pandemic, many organizations decided to enforce social distancing by requiring that their employees begin working from home. This decision changed the fundamental way in which many employees were accustomed to working. It also created new security challenges for organizations that had larger remote workforces. Tripwire wanted to learn the specifics of these challenges, so it commissioned Dimensional Research to 345 IT security professionals about them in mid-April 2020. As reported by Business Wire, a majority of respondents (58%) indicated that employee home network security was one of their areas of higher concern followed by increased attacks (45%), difficulties in keeping remote systems configured securely (41%) and obstacles with keeping remote systems compliant (38%). Reflecting on the difficulties of keeping remote workers safe, 89% of survey participants said their job was harder as a result of the new work-from-home policy. Nearly half (49%) blatantly said they couldn’t effectively secure employees’ home offices, leading 65% of respondents to admit their belief that their security was worse because of COVID-19.

Read More

Check Point software collaborates with New York University to close cybersecurity workforce gap

globenewswire | August 05, 2020

Check Point Software Technologies Ltd, a leading provider of cyber security solutions globally, extends its cyber security academia cooperation with New York University (NYU) to nurture the next generation of computer engineers. For the first time, NYU is partnering with a cyber-security software company that addresses multi vector protections: cloud, network, endpoint, and mobile. Leveraging Check Point’s unmatched experience and expertise in the cyber landscape, NYU Tandon School of Engineering students will receive full visibility and understanding of the Check Point Infinity Architecture via Check Point's eLearning system. The Infinity eLearning program gives students access to the following innovative Cyber Security learning paths.

Read More

DATA SECURITY

Modus Collaborates with AgileBlue to Introduce Modus Data Protector™, for Managed Breach Protection from Cybersecurity Threats

AgileBlue | April 30, 2021

Security threats grow rapidly, and proper investigation and response necessitate the use of people who are familiar with endpoints, networks, cloud systems, and other technologies. Many businesses need a professional SOC manager, an accomplished Security Analyst, a Threat Researcher, a Security Architect, a Security Analyst, a Cloud Security Architect, and so on. This ensures that you need a team that is always improving to have the best skills as you need them. Unfortunately, there is a critical lack of specialized cybersecurity expertise in the overall talent industry, and there are not enough qualified resources to fulfill the need. Cybersecurity is complicated, and different technologies will often be needed to work together. Maintaining technical expertise to implement, update, and customize each component, as well as educating the staff on new versions and features, is needed. You must manage these distributor relationships, licenses, and training operations if you operate your SOC. Having coverage 24 hours a day, seven days a week is no longer discretionary. It's a must! Allowing an enemy to sow seeds for hours, days, or weeks makes it infinitely more difficult to control and eliminate risks. The adversary is aware that they only have a finite amount of time to do as much harm as possible, as in the case of ransomware, or to set back doors, as in the case of data exfiltration. You have the best chance of recovery if you can investigate and answer within minutes, so having a solution that is available 24 hours a day, seven days a week is essential. If money isn't a problem and you have the resources devoted to building out a 24x7 Security Operations Center, it could make sense to go in that direction. If you are limited on any of those fronts, Modus suggests that SOCaaS is a safer option. In summary, Modus Data ProtectorTM SOCaaS will allow you to: • Leverage security insights from other organizations • Have predictable spending – no need for surprise budget requests • Handle alerts more efficiently and with more predictable results • Have the agility and keep pace with your ever-changing organization’s IT demands • Enjoy a 24 x 7 x 365 promise to you that includes human-based responses, asset discovery, vulnerability assessment, intrusion detection, behavior monitoring, log management, and cloud-based SIEM About AgileBlue AgileBlue is a software firm that offers a cutting-edge SOC-as-a-Service for 24X7 network monitoring, cloud security, data protection, and enforcement. AgileBlue's team of cybersecurity and technical experts created a new SOC-as-a-Service technology that safeguards the company's sensitive network infrastructure, cloud, and confidential data. AgileBlue, founded by Joe Marquette and Tony Pietrocola, is a premier 24X7 Autonomous CyberSOC. AgileBlue Leadership also advises executives and boards of directors on cyber threats, creating a cyber policy, and providing cyber risk management as a service. About Modus Modus Discovery, Inc is a relationship-driven data analytics firm founded by experienced founders and industry veterans. As corporate owners, CIOs/CTOs, general counsel, and cybersecurity professionals, we've been in your shoes. They understand the difficulties you are experiencing because they have faced them earlier. This empathy is what motivates them to provide you with the most successful solutions and to make each information governance or eDiscovery partnership a stunning success. Modus puts individuals, systems, and technologies together to assist clients with compliance and eDiscovery problems. The Modus team has gained subject matter expertise through decades of hands-on experience in their respective fields, resulting in informed and empowered advisors ready to make timely choices that support their clients and their needs.

Read More

Spotlight

DDoS attacks against financial firms have continued to grow in size and frequency. The specific tactics and sophistication of the attacks have evolved rapidly. Outages have prevented customers and prospects from opening new accounts, viewing account and billing information, conducting online transactions and accessing brand and product information. In other cases, while sites have technically been available during an attack, DDoS defense measures have caused response times to degrade up to 30 to 50 seconds, making sites effectively down from an end-user perspective.