News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Causes of data loss in German companies
Causes of data loss in German companies

Data loss is a problem that occurs in the interaction between humans and machines: “careless users” are much more likely to be the cause of such incidents than compromised or misconfigured systems. This is the finding of the first Data Loss Landscape Report from Proofpoint, a leading cybersecurity and compliance company. With the study, Proofpoint examines how current approaches to data loss prevention (DLP) and insider threats address current macro challenges such as data growth, sophisticated cybercrime groups and generative artificial intelligence (GenAI). The report shows that companies' investments in DLP solutions are often inadequate. 82...

Read more

The right strategy after a data loss
The right strategy after a data loss KI-MS

Companies around the world face numerous threats. International studies also show this. A study by Arcserve shows that 76 percent of companies have suffered a serious data loss. In this context, 83 percent described downtime of 12 hours or less as acceptable. 10 tips for a successful business continuity plan. As an Arcserve study shows, only 52 percent of affected companies were able to recover from their data loss in 12 hours or less. Although 95 percent of companies said they had a disaster recovery plan, only a small…

Read more

MOVEit zero-day gap: The countdown is on
MOVEit zero-day gap: The countdown is on

Last week, Progress Software reported a critical security vulnerability (CVE-2023-34362) in its MOVEit Transfer product and related MOVEit cloud solutions. The APT group CLOP, which also issued an ultimatum until June 14.06, carried out mass attacks and data theft on the software that is often used around the world. As the name suggests, MOVEit Transfer is a system that allows for easy storage and sharing of files across a team, department, company, or even a supply chain. The software is also used by the AOK, for example. In the current…

Read more

Triple penalty: ransomware extortion, data loss, fines
Triple penalty: ransomware extortion, data loss, fines

Negligent companies are quickly punished threefold: first ransomware extortion, then data loss, and last but not least, the penalty fee for a poor recovery plan. That's how complex ransomware can invade company resources. Last year, ransomware brought a US company that produces fuel to its knees. Behind this were criminal "partner companies" of the notorious DarkSide group. A typical example of a RaaS (ransomware as a service) attack: a small core team of criminals develops malware, makes it available to other bad guys, and handles victims' ransoms. However, they lead the actual attack...

Read more

Protection against data loss: artificial intelligence vs. human vision
Protection against data loss: artificial intelligence vs. human vision

Cyber ​​security is constantly evolving as cyber criminals become more sophisticated and digital security tools accelerate risk mitigation as much as possible. Where can artificial intelligence (AI) help in terms of cyber security and where not. A comment by Fiete Marohn, VIPRE DACH. The year 2020 presented even more opportunities for hackers to strike, such as through phishing emails such as spoofing authentic PPE providers or from HMRC to copy unsuspecting victims. Recently we even saw how phishers are now using the vaccination campaign to scam people by selling them for fake…

Read more

Valuable data always in view
Data protection data security cloud

Data discovery and context-aware data security. With the increasing use of the cloud, remote work and interconnectivity of business processes, sensitive data is nowadays stored in a multitude of systems, applications and databases, which makes protecting it a challenge. To effectively protect data from loss and theft, a company needs to know not only what data it owns, but also where it is stored, who has access to it, where it is being accessed and how it is being transferred. As one of the biggest business intelligence trends in recent years, data discovery is therefore a crucial component of ...

Read more