article thumbnail

12 Data Loss Prevention Best Practices (+ Real Success Stories)

eSecurity Planet

Conduct content analysis to improve safety measures. Sample access restriction from SolarWinds’ access rights management dashboard Encrypt Data This practice entails using data encryption tools to keep sensitive data confidential and safe from illegal access or exploitation, even if the device is lost or stolen.

article thumbnail

SHARED INTEL: How ransomware evolved from consumer trickery to deep enterprise hacks

The Last Watchdog

Although most people think of ransomware as a dodgy application that encrypts data and holds it for ransom, the concept is much more heterogeneous than that. File encryption 2013 – 2015. It emerged in September 2013 and paved the way for hundreds of file-encrypting menaces that have splashed onto the scene ever since.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Possible attacks on the TCP/IP protocol stack and countermeasures

Security Affairs

Protocol security. Therefore, one solution might be to encrypt the transmitted data so that it’s not intelligible in case of sniffing. In this case, a VPN (Virtual Private Network) can be used to create a secure communication network through the Internet, which is by definition not secure. Security analysis.

article thumbnail

OCR Settlement Emphasizes Importance of Implementing Safeguards to Protect PHI

Hunton Privacy

OCR investigated MAPFRE and found that the entity had committed several HIPAA violations by failing to (1) conduct an adequate risk analysis, (2) implement a security awareness and training program and (3) encrypt ePHI on portable devices. submit annual compliance reports for a period of three years.

article thumbnail

How One Company Survived a Ransomware Attack Without Paying the Ransom

eSecurity Planet

Screens then started to display a ransom demand, which said files had been encrypted by the NetWalker ransomware virus. Ankura immediately provided security operations center (SOC) services to stop the virus from spreading, protect against further damage, and to begin the process of removing it. The ransom demand was $3.6

article thumbnail

What Is Data Loss Prevention (DLP)? Definition & Best Practices

eSecurity Planet

Review Data in Real-Time DLP solutions perform instant analysis of data packets or files as they’re observed. DLP uses content inspection, behavior analysis, and machine learning to detect abnormalities that indicate data breaches or policy violations. The 10 steps outlined below show how data loss prevention works.

article thumbnail

OCR Settles Two HIPAA Cases with Public Health Centers in Oregon and Mississippi

Hunton Privacy

These vulnerabilities included (1) storing electronic protected health information (“ePHI”) on a cloud-based server without entering into a business associate agreement (“BAA”) with the cloud provider; (2) conducting inadequate risk analyses; and (3) failing to implement a mechanism to encrypt and decrypt ePHI.