Hitachi

U.S.A.

Hitachi Group Global Network

Americas

Asia

Europe

Middle East and Africa

Oceania

Close

Category: Ransomware
You are here: Home \ Ransomware
Posted on Tuesday, August 11th, 2020 by
The massive global influence of social media platforms such as Twitter and Facebook is testing our personal privacy to the limits. This is perhaps not surprising. The platforms have mass appeal, attracting everyone from the average person in the street to the President of the United States of America. With wide-scale adoption comes privacy and...

Topics: Canada Privacy Act, COVID-19, Cyber Law, Cybercrime, Facebook, GDPR, Law 64, Malware, Phishing, Privacy & Security, Ransomware, Social Engineering, Social Media, Spyware, TikTok, Twitter

Posted on Monday, July 13th, 2020 by
A smart security+privacy approach can be enabler and accelerator of digital transformation. In the last ten years, cybersecurity threats have unfortunately become normalized for the modern enterprise. Data breaches, Denial of Service attacks (DDoS), ransomware, and so on, are all, unfortunately, common problems affecting companies across every sector and of all sizes. The Data Breach...

Topics: Compliance, DDoS, Digital Transformation, DPIA, GDPR, Internet of Things, Office 365 Security, PIA, PIPEDA, Privacy & Security, Privacy Impact Assessment, Ransomware, Remote working, wfh, Working from home

Posted on Thursday, April 9th, 2020 by
Cyberattacks have increased in frequency during COVID-19 and now more than ever is the time to consider going passwordless to be more secure. The password is a simple thing that is employed throughout our digital life, enabling us to access myriad online and company resources. However, a survey by Dashlane found that we each have,...

Topics: Coronavirus, COVID-19, Cybersecurity Posture, Office 365 Security, Phishing, Ransomware, Remote working, Uncategorized, wfh, Working from home

Posted on Tuesday, March 24th, 2020 by
What guidelines should your organization be concerned with regarding information security when working from home? The world has entered “uncharted territory”. This was a statement from the World Health Organization (WHO) about the current COVID-19 pandemic. In reaction to this, companies across the world have fallen in line with health guidance on social distancing and...

Topics: Coronavirus, COVID-19, Data Protection Impact Assessment, DPIA, Pandemic Response Planning, Penetration Testing, Phishing, PIA, Ransomware, Remote working, Risk management, Social Engineering, wfh, Working from home

People_Cybercrime_2019
Posted on Friday, December 20th, 2019 by
The state of people and cybercrime is reaching new heights. What do we mean by this? Cybercriminals are mastering the art and science of behavior manipulation. Phishing and other methods of social engineering are so prevalent that Proofpoint announced that 99% of all cyber-attacks need human intervention to proceed. In order to counter this, security awareness...

Topics: Cybercrime, Cybersecurity Posture, Deepfake, Penetration Testing, Ransomware, Social Engineering, Supply Chain

Ransomware Infection
Posted on Wednesday, November 27th, 2019 by
You’ve been infected with ransomware… now what? And what are some effective tips to prevent ransomware infection? Ransomware is a type of malware that continues to cause havoc across the world. In this blog article, we are sharing 5 effective tips to help your business prevent ransomware infections.

Topics: Phishing, Ransomware, Security Practices, Social Engineering, Tips & Tricks, Trends & Technologies

Darknet Stolen Data
Posted on Tuesday, April 23rd, 2019 by
The darknet has become a digital marketplace where much of the stolen data we hear about ends up. There are many reasons for buying someone else’s data, including to commit ID theft, financial fraud, and even for some, the odd bit of blackmail. In this blog post, we will look at how our personal data ends up in the hands of the bad guys via the darknet.

Topics: Cybersecurity Posture, Darknet Intelligence, Digital Transformation, Managed Security Services, MSS, Penetration Testing, Phishing, Privacy & Security, Ransomware, Vulnerability Assessment, Vulnerability Management

Posted on Tuesday, April 16th, 2019 by
The darknet holds a deep pool of stolen data, threat plots, and the tools of cybercrime. Do you know the most commonly-used terms and terminologies when it comes to the darknet? Test your knowledge in our darknet crossword puzzle!

Topics: Digital Transformation, Penetration Testing, Phishing, Privacy & Security, Ransomware, Vulnerability Assessment

Posted on Tuesday, April 9th, 2019 by
The darknet holds a deep pool of stolen data, threat plots, and the tools of cybercrime. This forms a well of intelligence that we can apply to our own threat prevention needs. However, this most hidden part of the wider Internet needs the right tools to explore its murky depths. How does darknet intelligence help us fight cybercrime? How can we leverage the hidden depths of the darknet to gain actionable information?

Topics: Digital Transformation, Penetration Testing, Phishing, Privacy & Security, Ransomware, Vulnerability Assessment

Posted on Tuesday, April 2nd, 2019 by
The darknet remains clouded in mystery for many of us. When you think of the darknet, you think of nefarious people doing dastardly things. It seems a place that is hard to define and difficult to locate. And, if you could, would you want to enter its dark domain? In this article, we’ll look at what lurks beneath the surface of the internet.

Topics: Cyber Law, Ransomware

Latest Webinars | Watch Now

Cybersecurity, Cyber Crime and Your Business — How to Strengthen Your Cybersecurity Posture – In collaboration with Cytelligence

Watch Now

Cybersecurity 101 for Credit Unions – In collaboration with the Caribbean Confederation of Credit Unions (CCCU)

Watch Now

Introduction to Technical Security Testing for Credit Unions – In collaboration with the Caribbean Confederation of Credit Unions (CCCU)

Watch Now