News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Ransomware: Backup alone is not a security strategy
Ransomware: Backup alone is not a security strategy

Many companies think their data backup protects them against ransomware. The enticingly simple logic behind it: If you can restore all the data, you are not open to blackmail. By Ali Carl Gülerman, CEO and General Manager, Radar Cyber ​​Security. However, this is too short-sighted: Even if the system was successfully restored after an attack, sensitive information such as customer data or intellectual property could have been stolen. In addition, the risk of attack remains: Hackers can still be in the network or gain access again by installing a back door. In some cases, ransomware is used by cybercriminals as a red herring, ...

Read more

How mutations of ransomware attack backups

Ransomware attacks are becoming increasingly tricky. In addition to classic data encryption, attackers also look specifically for backups. With the right strategy, these attacks will come nowhere. In 2020, the cost of ransomware attacks was more than $ 20 billion - more than twice as much as two years earlier. The average cost of downtime was $ 283.000 - per injured party. While ransomware attacks used to be widely spread and carried out without a defined target, there are now much more precise attacks in which the ransomware attack is sometimes only part of the attack….

Read more

Ransomware: 5 steps to an emergency strategy
Ransomware: 5 steps to an emergency strategy

In recent months, numerous companies around the world have been exposed to ransomware attacks and a subsequent emergency that have not stopped even at well-known IT companies. Specialists have already predicted this development, as many companies switched to cloud applications unprepared due to the lockdowns. This offers an easy gateway for cyber criminals who access data, encrypt it and only release it for a ransom. With Commvault's 5-step guide, companies can quickly and easily set up an emergency strategy against ransomware attacks: 1. Create a plan A well thought-out and effective plan for emergencies is the elementary ...

Read more

On the trail of insider risk
On the trail of insider risk

Be it cyber attacks or the theft of sensitive data - the majority of companies recognize attacks from outside as a real danger. However, as the current Cyber ​​Security study by IDG market research shows, only just under 20 percent of the organizations surveyed rate insider risks as a threat. A mistake that can cause great damage. As part of its "1×1 of IT security" series, Microsoft explains how companies protect themselves from insider threats. According to the Cyber ​​Security study, 55 percent of the organizations surveyed in the DA-CH region have been victims of data theft by former or current employees. To go to a…

Read more

The right cloud for backups
B2B Cyber ​​Security ShortNews

Choosing the right cloud for backups: the cloud offers itself as a cost-effective, flexible and secure storage location. A comment from Marcus Busch, Managing Director of Leaseweb. “In times of distributed infrastructures, the cloud offers itself as a cost-effective, flexible and secure storage location for securing backups. Advantages of modern cloud backup solutions are that they are suitable for companies of all sizes and allow data backup from any server or device. When choosing a suitable cloud provider, however, companies should ensure that they have taken all necessary precautions to ensure that the data...

Read more

Design principles of IT security
Design principles of IT security

For IT security managers, an abrupt change from office to fully remote operation must feel like moving from a solid walled villa to the Wild West. Traditional limits of on-premises operation and thus also the control that it offers no longer exist. In the home office, users more or less control devices and software themselves. And that is where the difficulties for IT admins begin. The area to be secured increases suddenly. Just one click on a malicious email attachment, surfing a website with malware, an open WiFi network or an unsecured device, ...

Read more

EDR: Commissioner Threat Hunter
EDR: Commissioner Threat Hunter

People are still the most important factor in preventing and defending against cyber attacks. No cyber security can fend off every attack and close every gap. Many organizations rely on increasingly sophisticated defense technologies. But as is so often the case, the attackers are one step ahead of IT security - because they know the defense tools inside and out and therefore know every loophole, no matter how small. So technology alone is not enough. It is all the more important that companies proactively position themselves with the help of experts, recognize risks in advance and, in an emergency, damage as quickly as ...

Read more

Stay ahead of cyber criminals
Cyber ​​security strategy cyber criminals

If you consider the general threat situation, the number of cyber attacks on companies and the reports of successful hacks, cyber criminals always seem to be one step ahead of IT security with their innovative attacks. A plea for building a long-term cybersecurity strategy. No wonder - many CISOs and CIOs are mainly concerned with fending off the attacks that are taking place at the moment, instead of looking at the constantly evolving threat landscape in the long term. With a comprehensive and long-term cybersecurity strategy, companies would be much more effectively equipped against future attacks. This is despite the multitude of ...

Read more

2021 - This is what CIOs have to pay attention to

A10 Networks provides insights into the most pressing cybersecurity problems in 2021 - This is what CIOs need to be aware of. While the analog world was kept in check by a pandemic in 2020, cybercriminal activities and attacks created additional burdens in the digital space. Regardless of whether it is the increase in simple phishing attacks or one of the largest recorded DDoS attacks to date: 2020 was also the year in which the threat from cyber criminals grew rapidly - and this will continue in 2021. A10 Networks explains the most pressing cybersecurity challenges and what CIOs ...

Read more

New hacking strategy uncovered
Hacker strategy, attack, hacker

The SophosLabs have uncovered a new hacking strategy. Apparently confused attack methods should let security mechanisms run nowhere. But the forensic scientists at SophosLabs are on to them and have recently unmasked a new method of attack. A new attack method has hit the net for the specialists at SophosLabs. Security experts Fraser Howard and Andrew O'Donnell came across an unusual variant in their hunt for new threats. In summary, the chain of attacks begins with a malicious email message including VB scripting code and ends with the placement of a remote access Trojan called MoDi RAT. During their forensic examinations, the specialists discovered ...

Read more