Endpoint Security, Incident Response & More: Gartner Summit 2014

Dell SecureWorks will be attending the 2014 Gartner Security and Risk Management Summit as a Premier Sponsor June 23-26 in National Harbor, Maryland. If you are attending the conference, be sure to check out some of the exciting activities we have planned for the week around endpoint security, incident response planning, social engineering and much more.

Continue reading

Hacker Hijacks Synology NAS Boxes for Dogecoin Mining Operation, Reaping Half Million Dollars in Two Months

As early as February 8th of this year, computer users began to notice their Synology Network Attached Storage (NAS) boxes were performing sluggishly and had a very high CPU usage. As a result, investigations ensued and eventually a Facebook post, directed at Synology, was made. Ultimately, it was discovered that the cause of the excessive resource consumption was due to illegitimate software that had infected the systems, which ironically, was stored in a folder labeled “PWNED.”

Continue reading

Endpoint Security & Special Guest Robert O’Neill at Gartner Summit

We are thrilled to announce former Navy SEAL Team Leader Robert O’Neill as our special guest at this year’s Gartner Security and Risk Management Summit in National Harbor, Maryland. If you are attending our discussions and activities around endpoint security, cyber security or our other information security services, be sure to swing by our hospitality […]

Continue reading

Healthcare IT Security at Risk Due to Business Associate Negligence

Healthcare companies and businesses that do contract work for them may soon be left singing the blues to the tune of an old popular song by The Who. I can hear the new lyrics now: “Too much, Omnibus.” That “too much” could refer to rising penalties for noncompliance with HIPAA requirements under the new Omnibus Final Rule Summary, which went into effect Sept. 23 and has a maximum penalty of $1.5 million per violation.

Continue reading

Beware Cyber Scams Disguised as Holiday Goodies, Greetings and Discounts

With Cyber Monday fast approaching, online shoppers need to be wary of Holiday Cyber Scams, where hackers try to infect unsuspecting users with everything from banking malware, such as the ZeuS Banking Trojan; Ransomware, such as CryptoLocker (malware which encrypts your computer files, which are held for ransom until you pay hundreds of dollars for […]

Continue reading

The Underground Hacking Economy is Alive and Well

Many businesses around the world are struggling financially, but sadly the underground hacking economy seems to be alive and well. In July of this year, the FBI charged two Russian hackers for hacking into US Financial Institutions that resulted in the theft of millions of dollars from more than 800,000 victim bank accounts. One of these same hackers and several other hackers, were also charged with the stealing and selling of at least 160 million credit and debit card numbers, resulting in losses of hundreds of millions of dollars.

Continue reading

Healthcare Industry Dodges Catch-22

Healthcare organizations are caught in a daily paradox reminiscent of Joseph Heller’s best-selling novel about WWII, “Catch -22,” a term which has come to mean “a contradictory or self-defeating course of action.” Now, with all the media attention over data security concerns surrounding personal health information (PHI), healthcare organizations need to be especially careful about securing their infrastructure.

Continue reading

Cyber Security for Small Businesses

The top three IT challenges facing small-business owners were listed as the cost of needed upgrades, security issues and the time it takes to fix problems, according to the National Small Business Association’s 2013 Small Business Technology Survey. Furthermore, 94 percent of small-business owners said they were very or somewhat concerned about cyber security, while nearly half of small businesses reported having been the victim of a cyber-attack. These attacks result in service interruptions and loss of staff time, and typically cost small businesses thousands of dollars.

Continue reading

Get Smart With Your Cyber Security

As the old TV crime fighter Maxwell Smart might say, “Would you believe…?” Would you believe that in August, a cyber-attack was launched via a third-party vendor on the New York Times website as well as on a dozen other organizations? According to the Ponemon Institute 2013 Securing Outsourced Consumer Data Report, 65 percent of organizations surveyed had an information security breach involving consumer data outsourced to a vendor, and 64 percent said it happened more than once. That’s why you have got to know about the cyber security posture of your third-party vendors and the ways they handle IT security issues with their own vendors.

Continue reading

Online Tools

  • Print this Page
  • Share This Resource

By completing this form you'll be opting in to receiving future communications about products and services from Dell SecureWorks.