Remove endpoint-security get-serious-about-iot-security
article thumbnail

IT Management Solutions protects its clients with Webroot® Business Endpoint Protection

Webroot

“I have used a lot of different security products over the years, and I get approached by a lot of vendors,” says Pedro Nuñez. As president and CEO of New England based MSP IT Management Solutions, Nuñez is always on the lookout for products that go beyond just a traditional security operations center. Saving time.

article thumbnail

RSAC insights: Sophos report dissects how improved tools, tactics stop ransomware attack

The Last Watchdog

A new report from Sophos dissects how hackers spent two weeks roaming far-and-wide through the modern network of a large enterprise getting into a prime position to carry out what could’ve been a devasting ransomware attack. I had a lively discussion with Dan Schiappa, Sophos’ chief product officer, about this. Good guys prevail.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Targeted assets: The need for cyber resilient infrastructure

Webroot

As of now, we still don’t know much about the ransomware attack against the operators of the Colonial Pipeline. Details about how and when cybercriminals were able to compromise Colonial’s network have yet to emerge. Only an attentive employee and the delay needed to get the added chemical into the water supply prevented serious harm.

Insurance 112
article thumbnail

Healthcare – Patient or Perpetrator? – The Cybercriminals Within

Security Affairs

Our PHI is engrained within us; medical history cannot get changed. As such, this information can sell for three times as much as Personally Identifiable Information (PII) on the dark web and can get used in much more nefarious ways. Identity theft takes on a whole new meaning when a bad actor gets ahold of your PHI.

article thumbnail

MY TAKE: PKI, digital certificates now ready to take on the task of securing digital transformation

The Last Watchdog

Related: Why PKI is well-suited to secure the Internet of Things PKI is the authentication and encryption framework on which the Internet is built. The buckling of PKI a few years back was a very serious matter, especially since there was nothing waiting in the wings to replace PKI. Things have since taken a turn for the better.

article thumbnail

Microsoft Security Under Scrutiny After Recent Incidents

eSecurity Planet

Microsoft is struggling through a rough July for security issues even as the company continues to add more cybersecurity capabilities through acquisitions. The software giant earlier this month issued an emergency update in Windows after researchers at cybersecurity vendor Sangfor published a blog about a security flaw dubbed “PrintNightmare.”

article thumbnail

North Korean Threat Actors Targeting Healthcare Sector with Maui Ransomware

SecureWorld News

While large and active Ransomware-as-a-Service (RaaS) gangs like Conti, LockBit, and BlackCat always make headlines with their operations, it's important to learn about smaller ransomware families, as they can provide insight and help us understand more about cybercrime gangs as a whole. The report was published on June 7, 2022.