article thumbnail

Retail has a multi-cloud problem…with sensitive data

Thales Cloud Protection & Licensing

Digital transformation (DX) is fundamentally impacting all aspects of the economy across every industry, and nowhere is this truer than in retail. Analysis of this year’s results showed that the percentage of retailers increasing IT security spending declined. Encryption technologies are the top tools needed.

Retail 54
article thumbnail

How to make sure your digital transformation is secure

CyberSecurity Insiders

However, their integration raises new challenges around security, privacy and the reliability of underlying systems that a business utilises, which, in turn, requires the support of strong cybersecurity architecture. Untapped potential.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Mortgage Firm loanDepot Falls Victim to Cyberattack

SecureWorld News

With approximately 6,000 employees and a loan servicing portfolio exceeding $140 billion, loanDepot is a major nonbank retail mortgage lender in the United States. LoanDepot has confirmed that the cyber incident involved unauthorized third-party access to certain systems, resulting in the encryption of data.

article thumbnail

Ransomware: How to Protect Your Data

CyberSecurity Insiders

A multi-layered approach is required to reduce exposure to ransomware attacks and also to recover encrypted data more quickly and effectively. Citrix Content Collaboration captures versions of files in real time to ensure that a clean version is always available to replace a file that has been encrypted by ransomware.

article thumbnail

MY TAKE: Why the next web-delivered ad you encounter could invisibly infect your smartphone

The Last Watchdog

The tech titans have swelled into multi-billion dollar behemoths by myopically focusing on delivering targeted online advertising, in support of online retailing. Cybercriminals have begun escalating their efforts to bend the legitimate online advertising and retailing fulfillment ecosystem to their whims.

Retail 138
article thumbnail

Maastricht University finally paid a 30 bitcoin ransom to crooks

Security Affairs

It is unclear if the attackers have exfiltrated data from the systems before encrypting them. The attacker focused on encrypting data files in the Windows domain. TA505 hacking group has been active since 2014 focusing on Retail and banking sectors. ” read a management summary of the Fox-IT report and UM’s response.

article thumbnail

Key Developments in IoT Security

Thales Cloud Protection & Licensing

Digital identification would fulfill a critical element of attaining a zero trust architecture, especially important for industrial technology edge devices. Yes, and Ellen uses the example of a retail grocery store to effectively demonstrate the point. Encryption Key Management. To hear more, tune into the podcast.

IoT 100