article thumbnail

MY TAKE: The no. 1 reason ransomware attacks persist: companies overlook ‘unstructured data’

The Last Watchdog

All too many companies lack a full appreciation of how vital it has become to proactively manage and keep secure “unstructured data.”. One reason for the enduring waves of ransomware is that unstructured data is easy for hackers to locate and simple for them to encrypt. A few takeaways: Outside a database.

article thumbnail

How to Keep Your Information Safe for Data Privacy Day 2020

Thales Cloud Protection & Licensing

By implementing this security control, organizations can protect all structured and unstructured data that’s found across their on-premises, virtual, public cloud and hybrid environments. Indeed, they can abuse those keys to decrypt an organization’s data, create fraudulent identities and generate malicious certificates at will.

article thumbnail

Using Encryption with Access Controls to Mitigate Malware and Ransomware Damage

Thales Cloud Protection & Licensing

Centralized key management improves security by making key surveillance, rotation, and deletion easier while also separating duties so that no single administrator is responsible for the entire environment. The weakest link in the security chain is the people who manage, administer and operate their computer systems. System Auditing.