The healthcare industry is a major target for threat actors, and a breach could expose sensitive data such as medical records, social security numbers, and financial information if organizations aren’t prepared. But there are steps organizations can take to better arm themselves against malicious attacks and mitigate the risk.
It is Monday morning. You open your eyes as your alarm bellows into your ear. You awaken and think “Wow! The Barry Manilow concert was superb on Friday. I am glad I was able to go.” Soon, your remnant glee dissolves as you realize the tasks awaiting you this morning. You still have the problems […]
Organizations want to avoid breaches, but some of the traditional and expected behaviors can be counter-intuitive, putting sensitive and valuable information at risk. Our incident response experts share their experiences and explain some of the common pitfalls they’ve seen and offer tips to avoid making the same mistakes.
To mitigate risk and damage from potential cyberthreats, security professionals must have total visibility from endpoint to network.
As information security professionals, most of you are familiar with vulnerability assessments and penetration testing (pen tests for short). Both are valuable tools that can benefit any information security program and they are both integral components of a Threat and Vulnerability Management process. Are These Information Security Services the Same? The two are often incorrectly used interchangeably […]
Whether you’ve already jumped on the Bring Your Own Device (BYOD) bandwagon for some devices like smartphones and tablets and are thinking about adding others, or whether you’re just now thinking about BYOD, there are a few things to consider. First and utmost, is security. If users can connect their own devices to the network […]
Credit card thieves still profit from skimming scams and minimizing risk should be a top priority for merchants. With today’s technological and security advances, one would think that fraudsters would have to use more advanced technologies than the seemingly antiquated skimmers to steal credit card data. But in reality, skimmers are still common; they still […]
Data is Critical for Proper Information Security Monitoring Researchers rely on data from multiple sources before they announce their findings at a worldwide conference. Doctors rely on data from multiple tests before they make a diagnosis. It’s difficult to get a comprehensive view of any situation without data – and not just one source. Multiple […]
Prioritizing resources and effort to improve the overall security posture and incident readiness of any organization is an arduous but necessary task. No organization has unlimited funds and resources; in fact, the truth is quite the opposite. Fully exploiting threat intelligence can help IT professionals make decisions about best utilizing available resources. With respect to […]
ZeroAccess (also known as Sirefef) is a peer-to-peer (P2P) botnet for perpetrating advertising click-fraud. It was disrupted by law enforcement in December 2013. The Dell SecureWorks Counter Threat Unit™ (CTU) research team observed the botnet reactivate from March 21, 2014 until July 2, 2014. On January 15, 2015 at 7:58 pm EST, the botnet again […]