One of the major concerns analyzed by the IT and Security team of BVG India Ltd. was malware and ransomware attacks. The suspected reasons behind these attacks were phishing emails or unauthorized web browsing.
The sensitivity towards cyber-crime is increasing. VCs are backing those startups that arrived early in the cyber-security space. In India, this industry vertical is still nascent, with around 50 security product startups.
Despite all the noise from security vendors, most hackers and pentesters can worm into a network and exfiltrate valuable data in under a day, including for critical systems, according to a recent report from Nuix.
The American military was the first to formalise the concept of a 'kill chain', loosely defined as the six steps in a chain to go through to eliminate a target. These steps fall under the acronym F2T2EA: Find, Fix, Track, Target, Engage, Assess.
Two Canadian banks, The Bank of Montreal and CIBC-owned Simplii Financial, were targeted by hackers who managed to get access to the personal information of thousands of their customers.
SophosLabs research discovered that 75 percent of malware in an organization is unique to that organization which indicates the majority of attacks are zero-day
Network security is the practice of preventing and protecting against unauthorized intrusion into corporate networks. As a philosophy, it complements endpoint security, which focuses on individual devices; network security instead focuses on how those devices interact, and on the connective tissue between them.
The adoption of Health Information Exchanges (HIEs), EHRs and automation, are on the one hand paving way for better patient care, and on the other hand, exposing private data to thefts and breaches.