Remove Blog Remove Encryption Remove Exercises Remove Systems administration
article thumbnail

Mitigating Ransomware Attacks – Decoupling Encryption Keys From Encrypted Data

Thales Cloud Protection & Licensing

Mitigating Ransomware Attacks – Decoupling Encryption Keys From Encrypted Data. Once the hackers gain an inside entry in an organisation’s IT systems, they deploy a file-encrypting malware known as ransomware. Some ransomware selectively seeks out sensitive data and will only encrypt those files.

article thumbnail

First Multistate HIPAA Data Breach Lawsuit May Signal Increased State Interest in Data Security Enforcement

Data Matters

represented in its privacy policy that the Company used encryption and authentication tools to protect information but failed to encrypt the data (at rest) on its computer systems. The complaint also focuses on what the AGs allege was an “inadequate and ineffective” post-breach response.

article thumbnail

Data Protection in the Digital Transformation Era

Thales Cloud Protection & Licensing

In our earlier blog post , we had urged organizations to rethink their Enterprise Data Protection Strategy and recommended four key technologies for optimal data protection. In this post, we’ll elaborate on how organizations can finalize the best approach to implement data encryption at an organizational level in an agile and efficient way.