article thumbnail

The story of the year: ransomware in the headlines

SecureList

This is the era of big game hunting: high-profile B2B targets, big ransom demands, sophisticated attacks, highly sensitive data being stolen, and major fallout from a successful attack. The former target both B2B and B2C, while the latter target primarily the B2C sector. billion in transfers over the last three years.

article thumbnail

What Is a SaaS Security Checklist? Tips & Free Template

eSecurity Planet

They serve as benchmarks for upholding strong security requirements, evaluating existing tools, and assessing potential solutions. These checklists include security standards and best practices for SaaS and cloud applications, and B2B SaaS providers use them to guarantee that their solutions match customer security standards.

Risk 108
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

‘If you wait for government, you’re going to be waiting a long time’: A look at Biden’s cyber funding

SC Magazine

When I say classic, I mean basic application security – passwords and making sure that if you’re using cloud-based service from either Amazon or Google or Microsoft that they’ve got some of those security features toggled on. It depends whether the company is in the B2C market or in B2B.

article thumbnail

The story of the year: remote work

SecureList

One of the most critical questions of work-from-home security is related to employees’ awareness of the main concepts of cybersecurity. Whereas in the mailshots above, only a username and password were asked for, in later ones, a phone number was also requested.

Scams 62