article thumbnail

Aerial Direct, the O2’s largest UK partner suffered a data breach

Security Affairs

Hackers have stolen O2 customers’ data from a database run by Aerial Direct , one of the largest UK partners of the telecommunications services provider. The company provides IP telephony services and equipment, including mobile, fixed lines, as well as call, broadband, conferencing and hosting telecoms.

article thumbnail

The Surge of Double Extortion Ransomware Attacks

Pen Test

Sopra Steria - One of the Largest Reported Ransoms Europe's major IT services firm Sopra Steria was breached in October 2020 by the Ryuk gang, with extensive backups preventing major disruption. Keep backups completely isolated and air-gapped offline to prevent malware from infecting those too. Use immutable object storage for backups.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Top Database Security Solutions for 2021

eSecurity Planet

From a GUI enterprise manager to advanced logical replication, backup and recovery, and a migration toolkit, EDB is a go-to vendor for all Postgre database administrators. Started in 1987, the telecommunications provider has become a multinational technology whale. Also Read: Cloud Bucket Vulnerability Management in 2021.

Firewall 117
article thumbnail

What Is Encryption? Definition, How it Works, & Examples

eSecurity Planet

NIST continues to encourage the development of lightweight cryptography that can be used in constrained environments and researchers also continue to explore new types of hardware (microchips, architecture, etc.) Second, encryption key rotation can render data stored in backups or on removable media inaccessible.

article thumbnail

How to Stop DDoS Attacks: Prevention & Response

eSecurity Planet

Redundant devices or backup devices will generally be required for a resilient architecture and can be used to restore systems quickly after a DDoS attack. Ribbon Communications’ DDoS solutions focus on stopping attacks against a variety of telecommunications infrastructure (PBX, VoIP, SIP Trunks, etc.)

DDOS 145
article thumbnail

Best Network Monitoring Tools for 2022

eSecurity Planet

encryption in transit Tools for remote management , global dashboards, and geo IP tracking Access to 24×7 DevOps team for technical support and remediating active threats Logical secure access including role-based access control, 2FA , and SSO Automate configuration backup and recovery for resilient policies and controls.

Marketing 117
article thumbnail

Managed IT Service Providers (MSPs): A Fast Way to Secure IT

eSecurity Planet

Others will seek to specialize and provide services such as: Application monitoring Compliance consulting and services (PCI-DSS, HIPAA, etc.)