Remove 2018 Remove Education Remove Encryption Remove Security
article thumbnail

Security Compliance & Data Privacy Regulations

eSecurity Planet

Regulatory compliance and data privacy issues have long been an IT security nightmare. And since the EU’s General Data Protection Regulation (GDPR) took effect May 25, 2018, IT compliance issues have been at the forefront of corporate concerns. But those aren’t the only laws or regulations that affect IT security teams.

article thumbnail

Data Security Tips for 2018

Archive Document Data Storage

2018 is here, and it’s time to revisit your data security strategy. Consider using a password manager to help you remember and encrypt your passwords. Make sure that your WiFi network is protected with a strong password and WPA-2 encryption. Design a Secure Destruction Plan. Update Your Password Strategy.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

SHARED INTEL: How ransomware evolved from consumer trickery to deep enterprise hacks

The Last Watchdog

Numerous strains of this destructive code have been the front-page news in global computer security chronicles for almost a decade now, with jaw-dropping ups and dramatic downs accompanying its progress. File encryption 2013 – 2015. RaaS rollout 2015 – 2018. Targeting enterprises Late 2018 – present day.

article thumbnail

Phish of GoDaddy Employee Jeopardized Escrow.com, Among Others

Krebs on Security

“During the incident, the hackers changed the DNS records for Escrow.com to point to to a third party web server,” Barre wrote , noting that his security team managed to talk to the hacker responsible for the hijack via telephone. The attacker also obtained free encryption certificates for escrow.com from Let’s Encrypt.

Phishing 285
article thumbnail

UK Research and Innovation (UKRI) discloses ransomware attack

Security Affairs

At the time of writing, it is not clear if threat actors exfiltrated data from the UK agency that reported the incident to the National Crime Agency, the National Cyber Security Centre and Information Commissioner’s Office. If you want to receive the weekly Security Affairs Newsletter for free subscribe here. Pierluigi Paganini.

article thumbnail

Lancefly APT uses powerful Merdoor backdoor in attacks on Asian orgs

Security Affairs

The highly-targeted attacks aim at organizations in government, aviation, education, and telecom sectors. “Lancefly’s custom malware, which we have dubbed Merdoor, is a powerful backdoor that appears to have existed since 2018.” The intelligence-gathering campaign started in mid-2022 and is likely still ongoing.

article thumbnail

Three Strategies for Big Data Security

Thales Cloud Protection & Licensing

The 2018 Thales Data Threat Report (DTR) has great information on Big Data use and security. We surveyed more than 1,200 senior security executives from around the world, and virtually all (99%) report they plan to use Big Data this year. Top Big Data Security Concerns. Strategies for Securing Big Data.