If it hasn’t already been dubbed “The Year of Ransomware,” 2016 is well on its way to earning that title. Even though ransomware has been around since 1989 (starting with the AIDS Trojan), we’ve seen a spike in the number of incidents over the past couple years that has left us wondering: Why ransomware? Why now?
Having worked in the cybersecurity sector for 5 years, I’ve become quite the skeptic when it comes to unsolicited phone calls from one of my service providers. Last week, two so-called AT&T associates contacted me about the same issue. When I questioned their legitimacy, one associate reacted defensively, while the other remained calm. Here’s my story …
Maintenance can, at times, be overlooked when discussing budgeting for cybersecurity. It’s the little things we do not always remember that we need to do until after the initial purchase. For instance, when you buy a car, your expenses do not stop after signing papers and handing over the payment.
In today’s threat landscape, a firewall alone will not suffice. Cyberattacks are more complex, whether they engage multiple network layers (e.g. attacking the network and application layers of the OSI model simultaneously), or involve malware that can hop across ports. So, what technology components do you need?
When discussing cybersecurity expenses, we often find ourselves talking about the cost of cybercrime – or cybersecurity after the fact. For instance, we know a data breach will incur around $3.79 million in damages and/or losses.
Did you know that there are 3.2 billion+ Internet users worldwide, generating over 30 GB of Internet traffic per second?
A look at 180 Healthcare Data Breaches between January and August 2015