Hitachi

U.S.A.

Hitachi Group Global Network

Americas

Asia

Europe

Middle East and Africa

Oceania

Close

Category: Ransomware
You are here: Home \ Ransomware
Bad Rabbit Ransomware
Posted on Friday, October 27th, 2017 by
Who is affected? Learn more about the infection method and impact of Bad Rabbit ransomware and how to prevent it from happening.

Topics: Ransomware, Tips & Tricks

2017 Ransomware Trends and How to Protect Yourself Against the Malware

Topics: Ransomware

Weakness on Warning Road Sign
Posted on Tuesday, August 8th, 2017 by
Is your business ready for a cyber attack? The cyber security threat landscape is clearly more dangerous now than any time in history. While, historically, wars have been fought in the air, on land and on the seas, it now appears that the next war will be fought (or will begin) in cyber space. What are the next cyber threats to look out for and when will Executives take notice?

Topics: CISO, DDoS, Digital Transformation, Penetration Testing, Phishing, Ransomware, Vulnerability Assessment

2017 Trends
Posted on Tuesday, July 25th, 2017 by
Recent trends in cybersecurity attacks: threat actors involved, tactics used, and the industries targeted. The intent of this analysis of cybersecurity incident information can hopefully help organizations improve threat response time, improve cybersecurity defenses, and allocate cybersecurity resources more effectively.

Topics: DDoS, ICS Security, Phishing, Privacy & Security, Ransomware, Security Practices

How Banks Avoided the WannaCry Cyberattacks
Posted on Tuesday, July 18th, 2017 by
The WannaCry attack started in May of 2017, and within one day it was reported to have affected more than 230,000 devices in over 150 different countries. It hit major hospitals, car manufacturers, and even large telecommunications companies, yet one industry seemed to escape largely unscathed -- banking. While banks have been among the most popular targets for cyberattacks in the past, it seems this is at least one clear instance where the banks have benefited from adopting and evolving better cybersecurity practices and controls. Let’s take a closer look at what types of practices enabled banks to avoid the WannaCry ransomware epidemic.

Topics: Control Assessment, Ransomware, Security Practices

Ransomware and cyberinsurance
Posted on Tuesday, May 23rd, 2017 by
Is Ransomware Covered By Your Cyberinsurance?

Topics: Cyber Law, Privacy & Security, Ransomware

Ransomware What About the Law
Posted on Tuesday, November 15th, 2016 by
What are the legal implications of ransomware? How should organizations prevent, respond and recover from digital extortion?

Topics: Cyber Law, Ransomware, Security Practices

protect-your-data-from-ransomware-attacks-above-security
Posted on Tuesday, November 15th, 2016 by
2016 has been a whirlwind year when it comes to ransomware attacks. Ransomware incidents have exploded and organizations, especially those holding critical information, find themselves helpless to combat the malicious code.

Topics: Ransomware, Security Practices

How to fight ransomware
Posted on Thursday, May 5th, 2016 by
Ransomware is a malware that restricts access to computers by encrypting the files on the infected computer or connected network servers, and then demands the user pay a fee (a ransom) to remove the restrictions. Check out our infographic to know how to prevent, respond to and recover from this malware.

Topics: Ransomware, Security Practices, Tips & Tricks

5 steps to protect against ransomware
Posted on Tuesday, April 19th, 2016 by
Would you or your organization know what to do if your computer were infected with ransomware? Here are 5 steps you can take to avoid getting infected by this malware.

Topics: Cryptography, Ransomware, Security Practices, Tips & Tricks

Latest Webinars | Watch Now

 

The Next Generation of Managed Security, in collaboration with PCM.

Watch Now

Reporting Data Privacy Obligations to the Board: A Practical Approach to Ongoing Compliance, in collaboration with Nymity.

Watch Now

Subscribe

Recent Videos

What is Penetration Testing?

What is a Vulnerability Assessment?

What is a Control Assessment?


More