Remove to-pay-or-not-to-pay-that-is-the-ransomware-question
article thumbnail

Ransomware – To Pay, or Not to Pay?

Thales Cloud Protection & Licensing

Ransomware – To Pay, or Not to Pay? And when thinking about criminal innovation, ransomware attacks clearly fall into that definition of “disruptive”, especially for any business on the receiving end of that “innovation”. Tue, 06/14/2022 - 06:17. Tipping the Scales.

article thumbnail

Why backups are not the panacea for recovery from a ransomware attack

SC Magazine

The most pervasive wisdom about preventing damage from ransomware is to backup systems, but that alone may not be enough. The most pervasive wisdom about preventing damage from ransomware is to backup systems. So in an era of increased concern about ransomware, is solving the ransomware scourge as simple as investing in some backups?

Backups 141
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Three takeaways from the Colonial Pipeline attack

SC Magazine

Some saw this as a typical ransomware attack, albeit on a vulnerable target. When a critical infrastructure organization shuts down operations, as Colonial Pipeline did, the instinct for any security professional is to first question whether OT was compromised. That distinction is important for identifying risk.

Insurance 117
article thumbnail

The Cyber Insurance Landscape Has Grown More Complicated

SecureWorld News

When considering adding a cyber insurance policy, organizations, both public and private, must weigh the pros and cons of having insurance to cover against harm caused by a cybersecurity incident. Compliance: Certain industries and jurisdictions require organizations to have cyber insurance or to meet certain cybersecurity standards.

article thumbnail

Policy debate: the pros and cons of cybersecurity insurance

BH Consulting

Also known as cyber risk insurance, it’s now a prerequisite in some public sector tenders. In reality, the tenderer should be asking every bidder questions such as: Is it certified to an independent security standard like ISO 27001 ? Organisations are coming under increasing pressure to take out cybersecurity insurance cover.

article thumbnail

Remember GDPR? Expect another set of cyber regulations around vulnerabilities

SC Magazine

For the first time in its 60-year history, the OECD offered policy guidelines for risk reduction through vulnerability management. For the first time in its history this past February, the Organization for Economic Cooperation and Development (OECD) offered policy guidelines for digital risk reduction through vulnerability management.

article thumbnail

Poll Data: What CEOs Need to Know About Cybersecurity Going into 2022

CyberSecurity Insiders

Like years past, 2021 revealed more of the same for the cybersecurity industry—more breaches, bigger ransomware attacks, higher stakes. The end of the year is a good time to reflect on the past 12 months and create a plan to improve in 2022. After analyzing the responses, below are five recommendations every CEO should know going into 2022.