A sharp rise in ransomware is buffeting the health care sector and forcing IT security professionals to reevaluate how they tackle the threat.
More than a third of health care organizations were hit by ransomware in the last year, according to a Sophos survey of 328 representatives from the health care sector.
Of those hit by ransomware in the last year, 65% said the cybercriminals succeeded in encrypting their data in the most significant attack. Just over a third (34%) of those whose data was encrypted paid the ransom to get their data back in the most significant ransomware attack.
Elcomsoft System Recovery is a perfect tool for digital field triage, enabling safer and more secure in-field investigations of live computers by booting from a dedicated USB media instead of using the installed OS. The recent update added a host of features to the already great tool, making it easier to examine the file system and extract passwords from the target computer.
Cybersecurity researchers have disclosed a new executable image tampering attack dubbed “Process Ghosting” that could be potentially abused by an attacker to circumvent protections and stealthily run malicious code on a Windows system.
“With this technique, an attacker can write a piece of malware to disk in such a way that it’s difficult to scan or delete it — and where it then executes the deleted malware as though it were a regular file on disk,” Elastic Security researcher Gabriel Landau said. “This technique does not involve code injection, Process Hollowing, or Transactional NTFS (TxF).”
Cyberstalking is the specific use of electronics (usually the internet) to control, track, and spy on another person, group of people or even companies. Whilst it may seem like a relatively recent phenomenon the term can be traced back to the nineties. Cyberstalking is hugely prevalent, with a study in the United States from 2009 showing that one in four stalking victims had also been cyberstalked as well.
A solid password policy is the first line of defense for your corporate network. Protecting your systems from unauthorized users may sound easy on the surface, but it can actually be quite complicated. You have to balance password security with usability, while also following various regulatory requirements.
Companies in the EU must have password policies that are compliant with the General Data Protection Regulation (GDPR). Even if your company isn’t based in the EU, these requirements apply if you have employees or customers residing in the EU or customers purchasing there.
In this post, we will look at GDPR requirements for passwords and provide practical tips on how to design your password policy. Remember, even if GDPR isn’t required for you now, the fundamentals of a data protection regulation plan can help strengthen your organization’s security.