article thumbnail

Thales 2023 Data Threat Report: The Increased Telco Cybersecurity Challenges in the 5G Era

Thales Cloud Protection & Licensing

Thales 2023 Data Threat Report: The Increased Telco Cybersecurity Challenges in the 5G Era madhav Tue, 09/12/2023 - 05:15 Telecommunications firms have always faced a unique set of security challenges. IoT devices have a history of being the targets of botnet recruitment and engines for distributed denial of service (DDoS) attacks.

article thumbnail

Protecting Medical Data Against a Cyber-Attack Pandemic

Thales Cloud Protection & Licensing

Protecting Medical Data Against a Cyber-Attack Pandemic. Cyber criminals are always eager to take advantage of emergencies to further launch their nefarious actions. Besides dealing with the public health pandemic, healthcare providers must deal with another pandemic: cyber-attacks. An expanding attack surface.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Protecting Medical Data Against a Cyber-Attack Pandemic

Thales Cloud Protection & Licensing

Protecting Medical Data Against a Cyber-Attack Pandemic. Cyber criminals are always eager to take advantage of emergencies to further launch their nefarious actions. Besides dealing with the public health pandemic, healthcare providers must deal with another pandemic: cyber-attacks. An expanding attack surface.

article thumbnail

The Evolving Cybersecurity Threats to Critical National Infrastructure

Thales Cloud Protection & Licensing

However, simple actions like adopting multi-factor authentication (MFA) or encrypting sensitive data everywhere should be exercised throughout the year and not just during that month. of the surveyed organizations encrypt more than 90% of their sensitive data stored in the cloud. And only a mere 2.6%

article thumbnail

Manufacturing needs to adopt a Zero Trust approach to mitigate increased cyber threats

Thales Cloud Protection & Licensing

Today, at the dawn of the 4th industrial revolution, manufacturers of all kinds are a tempting and vulnerable high-value target for threat actors because of their high intrinsic worth and the dangers of economic harm from supply chain disruptions. Many devastating full-scale cyber attacks started from a simple user error.

article thumbnail

Are Retailers Shopping for a Cybersecurity Breach?

Thales Cloud Protection & Licensing

What would the consequences be if such an event happens were to happen on Black Friday, Cyber Monday, or during the holiday shopping season? Retailers started the century as the prime targets for cyber attackers looking for credit card data. They should consider the following tips: 1. Data Security. More About This Author >.

Retail 127
article thumbnail

The Pain of Double Extortion Ransomware

Thales Cloud Protection & Licensing

Double extortion ransomware is a growing type of cyber-attack in which a victim’s sensitive data is first stolen, and then encrypted, giving the criminal the option of demanding two separate ransom payments. As part of double extortion attacks, tactics often include the threat of DDoS attacks.