News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Many ransomware attacks in the healthcare sector
Many ransomware attacks in the healthcare sector

Cyber ​​attacks on the healthcare sector are on the rise. The Health Sector Cybersecurity Coordination Center of the US Department of Health and Human Services recorded 2021 ransomware incidents in the healthcare sector as early as the beginning of 82, and many more followed. Almost 60 percent related to the US market. But after the US, European countries are targeted. The effects were devastating. Large hospitals had an average downtime of 6,2 hours and costs of $21.500 per hour. Midsize hospitals averaged nearly 45.700 hours of downtime and the cost more than doubled at $XNUMX an hour...

Read more

New Apple security feature: lockdown mode 

Apple has announced a new protection mechanism for particularly exposed users. Lockdown Mode promises a high level of security for specific users who, because of their person or work, may be personally targeted by sophisticated digital threats. The NSO Group (Pegasus Spyware) and other private companies involved in the development of government-sponsored spyware often undetected threaten a small target group of important or high-level users. Therefore, Apple offers a new security mode: Enabling lockdown mode in iOS 16, iPadOS 16 and macOS Ventura further strengthens device defenses and restricts…

Read more

EDRM: Real-time encryption
EDRM: Real-time encryption

It is becoming increasingly difficult to keep sensitive data secure. As working from anywhere increases, employees now work freely with each other, as well as with contractors and partners. EDRM - Enterprise Digital Rights Management - with real-time encryption helps solve problems. However, this freedom to collaborate also means that information is shared between devices, applications and networks over which the company does not necessarily have control. Against this background, Lookout, an expert in mobile & cloud security, explains the aspects and benefits of EDRM (Enterprise Digital Rights Management). To ensure, that…

Read more

Cloud security: SASE, SSE - what is what?
Cloud security: SASE, SSE - what is what?

In the area of ​​cloud security and networking, there is currently talk of SASE (Secure Access Service Edge) and SSE (Security Service Edge) - what is the relationship between the two frameworks? Lookout sheds light on the conceptual jungle. To take advantage of cloud-centric business models, many companies are considering developing a SASE architecture. However, choosing a suitable solution is not easy. There are a variety of vendors that sell tools to secure the interactions between devices, applications, on-premises resources, and infrastructure. As such, it can be difficult to choose the right mix of security technologies that…

Read more

How serious is the mobile malware threat to businesses?
How serious is the mobile malware threat to businesses?

Mobile malware is a growing threat to businesses. The number of attackers who have diversified their tools to attack mobile targets in addition to desktop targets has increased significantly. There are mutliple reasons for this. An analysis of Lookout. Certain categories of malware, such as ransomware, have proven successful in attacking non-mobile infrastructure. Attackers are now hoping for financial gains by targeting a user base that often does not expect to be targeted by mobile "locker" or ransomware applications. While mobile ransomware does not directly impact corporate infrastructure,…

Read more

Cloud and mobile devices - a question of security 
Cloud and mobile devices - a question of security

Pervasive cloud access to corporate data and resources from any device is what users expect as it increases productivity and allows employees to connect from almost anywhere. However, companies should pay strict attention to security. “However, this convenience can pose a cybersecurity risk for small businesses, warns IT security expert Lookout. If this risk is not mitigated, it can lead to data breaches. Attackers target employees on any device that can access sensitive data. As cloud-based platforms enable device-independent data access,…

Read more

Hackers are targeting Microsoft Teams
Hackers are targeting Microsoft Teams

Recent reports show that hackers are using Microsoft Teams to spread malware. The attacks are carried out by attaching .exe files to Teams chats to install a trojan on the end user's computer. The Trojan is then used to install malware. Lookout lists possible tactics and countermeasures. “The first tactic used by hackers is to obtain Microsoft 365 credentials from employees, which would give them access to all applications in the Microsoft suite. Lookout data shows that attackers are primarily targeting mobile channels such as SMS, social media platforms, messaging apps...

Read more