Hitachi

U.S.A.

Hitachi Group Global Network

Americas

Asia

Europe

Middle East and Africa

Oceania

Close

Category: Ransomware
You are here: Home \ Ransomware
Ransomware Infection
Posted on Wednesday, November 27th, 2019 by
You’ve been infected with ransomware… now what? And what are some effective tips to prevent ransomware infection? Ransomware is a type of malware that continues to cause havoc across the world. In this blog article, we are sharing 5 effective tips to help your business prevent ransomware infections.

Topics: Phishing, Ransomware, Security Practices, Social Engineering, Tips & Tricks, Trends & Technologies

Darknet Stolen Data
Posted on Tuesday, April 23rd, 2019 by
The darknet has become a digital marketplace where much of the stolen data we hear about ends up. There are many reasons for buying someone else’s data, including to commit ID theft, financial fraud, and even for some, the odd bit of blackmail. In this blog post, we will look at how our personal data ends up in the hands of the bad guys via the darknet.

Topics: Cybersecurity Posture, Darknet Intelligence, Digital Transformation, Managed Security Services, MSS, Penetration Testing, Phishing, Privacy & Security, Ransomware, Vulnerability Assessment, Vulnerability Management

Posted on Tuesday, April 16th, 2019 by
The darknet holds a deep pool of stolen data, threat plots, and the tools of cybercrime. Do you know the most commonly-used terms and terminologies when it comes to the darknet? Test your knowledge in our darknet crossword puzzle!

Topics: Digital Transformation, Penetration Testing, Phishing, Privacy & Security, Ransomware, Vulnerability Assessment

Posted on Tuesday, April 9th, 2019 by
The darknet holds a deep pool of stolen data, threat plots, and the tools of cybercrime. This forms a well of intelligence that we can apply to our own threat prevention needs. However, this most hidden part of the wider Internet needs the right tools to explore its murky depths. How does darknet intelligence help us fight cybercrime? How can we leverage the hidden depths of the darknet to gain actionable information?

Topics: Digital Transformation, Penetration Testing, Phishing, Privacy & Security, Ransomware, Vulnerability Assessment

Posted on Tuesday, April 2nd, 2019 by
The darknet remains clouded in mystery for many of us. When you think of the darknet, you think of nefarious people doing dastardly things. It seems a place that is hard to define and difficult to locate. And, if you could, would you want to enter its dark domain? In this article, we’ll look at what lurks beneath the surface of the internet.

Topics: Cyber Law, Ransomware

Bad Rabbit Ransomware
Posted on Friday, October 27th, 2017 by
Who is affected? Learn more about the infection method and impact of Bad Rabbit ransomware and how to prevent it from happening.

Topics: Ransomware, Tips & Tricks

2017 Ransomware Trends and How to Protect Yourself Against the Malware

Topics: Ransomware

Weakness on Warning Road Sign
Posted on Tuesday, August 8th, 2017 by
Is your business ready for a cyber attack? The cyber security threat landscape is clearly more dangerous now than any time in history. While, historically, wars have been fought in the air, on land and on the seas, it now appears that the next war will be fought (or will begin) in cyber space. What are the next cyber threats to look out for and when will Executives take notice?

Topics: CISO, DDoS, Digital Transformation, Penetration Testing, Phishing, Ransomware, Vulnerability Assessment

2017 Trends
Posted on Tuesday, July 25th, 2017 by
Recent trends in cybersecurity attacks: threat actors involved, tactics used, and the industries targeted. The intent of this analysis of cybersecurity incident information can hopefully help organizations improve threat response time, improve cybersecurity defenses, and allocate cybersecurity resources more effectively.

Topics: DDoS, ICS Security, Phishing, Privacy & Security, Ransomware, Security Practices

How Banks Avoided the WannaCry Cyberattacks
Posted on Tuesday, July 18th, 2017 by
The WannaCry attack started in May of 2017, and within one day it was reported to have affected more than 230,000 devices in over 150 different countries. It hit major hospitals, car manufacturers, and even large telecommunications companies, yet one industry seemed to escape largely unscathed -- banking. While banks have been among the most popular targets for cyberattacks in the past, it seems this is at least one clear instance where the banks have benefited from adopting and evolving better cybersecurity practices and controls. Let’s take a closer look at what types of practices enabled banks to avoid the WannaCry ransomware epidemic.

Topics: Control Assessment, Ransomware, Security Practices

Latest Webinars | Watch Now

 

The Next Generation of Managed Security, in collaboration with PCM.

Watch Now

Reporting Data Privacy Obligations to the Board: A Practical Approach to Ongoing Compliance, in collaboration with Nymity.

Watch Now