Remove 2016 Remove Cyber Attacks Remove IoT Remove Technology
article thumbnail

How to protect healthcare and life-sciences data from a cyber attack pandemic

Thales Cloud Protection & Licensing

How to protect healthcare and life-sciences data from a cyber attack pandemic. Once slow to adopt new technologies, healthcare-related industries have been rapidly embracing digitalization to enable patient-centric care that is more effective for patients and safer for patients, healthcare professionals and researchers.

article thumbnail

The Growing Presence (and Security Risks) of IoT

Thales Cloud Protection & Licensing

As most of us know, IoT devices are on the rise in enterprise networks. According to McKinsey & Company , the proportion of organizations that use IoT products has grown from 13 percent in 2014 to 25 percent today. The issue is that these tens of billions of new devices will likely amplify the inherent security risks of IoT.

IoT 122
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Top 5 Attack Vectors to Look Out For in 2022

Security Affairs

Threat actors are continually looking for better ways to target organizations, here are the top five attack vectors to look out for in 2022. Malicious actors are continually looking for better ways to carry out successful cyber attacks. Remote Technology. IoT Devices. Conclusion.

IoT 116
article thumbnail

MY TAKE: Why consumers are destined to play a big role in securing the Internet of Things

The Last Watchdog

The drivers of IoT-centric commerce appear to be unstoppable. Count on the wide deployment of IoT systems to continue at an accelerated rate. There are already more IoT devices than human beings on the planet, according to tech industry research firm Gartner. This time the stakes are too high. Security-by-design lacking.

Internet 189
article thumbnail

Episode 244: ZuoRAT brings APT Tactics to Home Networks

The Security Ledger

Cyber attacks on small office and home office (or SOHO) routers aren’t new. But for all its bluster, Mirai and the IoT botnets that followed it were pretty simple creatures. The goal was to build a platform for future, external attacks – not probing the home and small business networks the routers fronted.

IoT 98
article thumbnail

MY TAKE: Here’s how ‘bulletproof proxies’ help criminals put compromised IoT devices to work

The Last Watchdog

Related: How botnets gave Trump 6 million faked followers To put it plainly, this represented a spike in cyber attacks bouncing through ordinary Internet-connected devices humming away in homes across America. These attacks were carried out by cyber criminals leveraging an insidious new attack tool: bulletproof proxies.

IoT 153
article thumbnail

MY TAKE: Former NSA director says cybersecurity solutions need to reflect societal values

The Last Watchdog

Related: The golden age of cyber espionage The United States, at present, operates with a “nebulous” definition of what constitutes a cyber attack that rises to the level of threatening national security, asserts Rogers, who was commander, U.S. Yet cyber exposures are multiplying.