article thumbnail

12 Data Loss Prevention Best Practices (+ Real Success Stories)

eSecurity Planet

Sample access restriction from SolarWinds’ access rights management dashboard Encrypt Data This practice entails using data encryption tools to keep sensitive data confidential and safe from illegal access or exploitation, even if the device is lost or stolen.

article thumbnail

The Pain of Double Extortion Ransomware

Thales Cloud Protection & Licensing

The problem is that businesses are not yet aware of double or triple extortion ransomware and how these tactics can affect their data protection strategies. According to a separate study 2 , double extortion, which became popular in the first quarter of 2020, collects confidential business information before encrypting a victim's database.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

SHARED INTEL: How ransomware evolved from consumer trickery to deep enterprise hacks

The Last Watchdog

Numerous strains of this destructive code have been the front-page news in global computer security chronicles for almost a decade now, with jaw-dropping ups and dramatic downs accompanying its progress. File encryption 2013 – 2015. They added data theft to the classic encryption scenario. inch diskettes.

article thumbnail

Avoslocker ransomware gang targets US critical infrastructure

Security Affairs

. “AvosLocker is a Ransomware as a Service (RaaS) affiliate-based group that has targeted victims across multiple critical infrastructure sectors in the United States including, but not limited to, the Financial Services, Critical Manufacturing, and Government Facilities sectors. Focus on cyber security awareness and training.

article thumbnail

QR Codes: A Growing Security Problem

eSecurity Planet

Quick response (QR) codes are a convenient format for storing all kinds of information in a readable and secure way, at least when correctly implemented. With the ongoing COVID-19 pandemic, for example, governments have recently implemented QR codes to create Digital COVID Certificates for vaccination, tests status and other reasons.

Security 113
article thumbnail

What VCs See Happening in Cybersecurity in 2023

eSecurity Planet

The startup manages an open source project for key management, authorization enforcement policies, and end-to-end encryption. See the Top Code Debugging and Code Security Tools. New Era for Work and Security. Earlier this year, Ballistic Ventures invested $7 million in Nudge Security because of its focus on the modern workforce.

article thumbnail

Key Developments in IoT Security

Thales Cloud Protection & Licensing

Is there IoT security awareness training for employees who use the technology? These are all parts of the specialized awareness that needs to be conveyed to the staff. The rise of IoT has not gone unnoticed in government circles. Data security. Encryption Key Management. To hear more, tune into the podcast.

IoT 100