Remove 2019 Remove Encryption Remove Phishing Remove Threat Reports
article thumbnail

2021 Data Threat Report: How Covid Changed Everything

Thales Cloud Protection & Licensing

2021 Data Threat Report: How Covid Changed Everything. The 2021 Thales Data Threat Report serves exactly this purpose – it is a crucial reflection of 2020. Only 17% indicated that they have protected more than 50% of their sensitive cloud data with encryption. Cloud Encryption Gateway. Data security.

article thumbnail

March Madness and Distracted Employees – Bracket Busted

Thales Cloud Protection & Licensing

Employees are the first line of defense when it comes to averting phishing attempts and distracted employees are off their game. Our 2019 Data Threat Report-Global Edition , revealed that 97% of survey respondents reported their organization was already underway with some level of digital transformation.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Healthcare Organizations Need to Adapt Their Data Protection Policies to the New Threat Environment

Thales Cloud Protection & Licensing

In addition, telemedicine has generated a larger pool for potential phishing scams as well as other socially-engineered, and technically based, attacks (e.g., The degree of digitalization and the scientific efforts for the development of a COVID-19 vaccine have further increased the threat surface. ransomware).

article thumbnail

Ransomware Evolves as Groups Embrace as-a-Service Models

eSecurity Planet

McAfee researchers addressed the shift in ransomware strategy this week in their McAfee Threats Report: June 2021. Likewise, circa 2019/2020, we saw the introduction of leak sites. T1071 – Application Layer Protocol and T1573 – Encrypted Channel (HTTPS). T1486 – Data Encrypted for Impact.

article thumbnail

The Growing Presence (and Security Risks) of IoT

Thales Cloud Protection & Licensing

Avast explains that one of the biggest IoT security threats is the use of vulnerable devices to access organizations’ network and thus may gain access to sensitive information. Vulnerable devices could be used to spread malware within the enterprise, used for corporate espionage, surveillance of personnel, or plan whaling phishing campaigns.

IoT 122
article thumbnail

This World Backup Day, Our Customers Do the Talking

Webroot

We were encrypting the hard drives, so we didn’t lose any data to the wild as the encryption couldn’t be cracked. Sources: 1 SonicWall Capture Labs 2 VMware/Carbon Black Global Threat Report June 2020 3 Webroot RTAP. We came in one day to find the office doors busted down and the computers raided.

Backups 62
article thumbnail

The Long Run of Shade Ransomware

Security Affairs

As stated in a recent Eset report , the Shade infection had an increase during October 2018, keeping a constant trend until the second half of December 2018, taking a break around Christmas, and then resuming in mid-January 2019 doubled in size (shown in Figure 1). Shade encrypts all the user files using an AES encryption scheme.