Remove tag data-protection-act
article thumbnail

Part 1: OMG! Not another digital transformation article! Is it about understanding the business drivers?

ARMA International

Some technology trends such as real-time data analytics are on-going, while others are more recent, such as blockchain. This part will also discuss managing CS risks such as ransomware, privacy, change management, and user adoption. Information and data are synonyms but have different definitions. Introduction.

article thumbnail

Is the Resurgence of Phishing Attacks A Cause For Concern?

Adapture

Easily one of the oldest attack vectors in the history of cybercrime, phishing attacks remain one of the most commonly used techniques for spreading malware, stealing credentials, infiltrating a network, or carrying out a range of nefarious acts on an organization. login credentials, personal data, etc). What is a Phishing Attack?

article thumbnail

The History of Computer Viruses & Malware

eSecurity Planet

Ransomware, for example, usually doesn’t self-replicate. Even as we focus on current cybersecurity threats and protections , it can be just as important to take a look at the history of these malicious pieces of software and how their beginnings inform the way they’re used and circulated today.