article thumbnail

Ransom hits main street

Webroot

Ransomware uses modern technology and cutting-edge tools to do something that feels decidedly old fashioned – steal from you. explains Grayson Milbourne, security intelligence director for Carbonite + Webroot. Cybercriminals aren’t the only ones using new technology, though. Targeted by ransomware. Ransomware tactics.

article thumbnail

Ransomware, BEC and Phishing Still Top Concerns, per 2021 Threat Report

Webroot

“Like phishing prevention, successfully preventing BEC involves a combination of robust training for end users and appropriately designed and publicized business policies around how to handle financial or technical requests.” – Grayson Milbourne, Security Intelligence Director. Even malware (for the moment) is trending gently downward.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Cyber Security Awareness and Risk Management

Spinone

Today, c yber security incidents lead to significant damage, alarming organizations of all types and sizes in different geographic locations. The contemporary world has witnessed the rise of the Internet and global communication, and collaboration technologies, including mobile data use and the culture of bring your own device [BYOD].

article thumbnail

Remote Work is Here to Stay, and Other Cybersecurity Predictions for 2021

Webroot

As such, automation and the adoption of AI technologies will be critical to plugging the gap. Read on for more details from leading engineers, security analysts and product specialists from around our organization for complete cybersecurity predictions for 2021. Grayson Milbourne, security intelligence director, Carbonite + Webroot.

article thumbnail

What a difference a year makes, or does it?

Webroot

Grayson Milbourne, security intelligence director at Carbonite + Webroot, predicted that in the coming year, “Expect to see more attacks against less-developed nations—not to generate revenue, but rather to disrupt and destroy.”. Is the threat landscape more of the same? Cybercrime is no longer a punishment-free crime.”.

article thumbnail

9 Considerations For Hong Kong Banks To Address The STDB Guidelines

Thales Cloud Protection & Licensing

The digital transformation initiatives have shifted the technology landscape and introduced new threats and risks. To address the escalating cyber risks, the Hong Kong Association of Banks (HKAB) developed and published guidelines for Secure Tertiary Data Backup (STDB). Data security. Wood Lam | Security Consultant.

Banking 114
article thumbnail

Is G Suite HIPAA Compliant? An Admin Guide For Configuring G Suite for HIPAA Compliance 

Spinone

An important methodology when it comes to ensuring your G Suite environment is HIPAA compliant comes down to the People, Processes , and Technology triangle. Again, proper end user sharing processes and technology controls in place can help make sure that PHI is not exposed.