Category Archives: Best practices

What to do if you’re infected by Ransomware

2016-1H-The-Reign-of-Ransomware

If you’re reading this posting, odds are that you or someone you know is the victim of a ransomware attack. Ransomware continues to grow as a prevalent threat . The number of new ransomware families we saw in the first half of 2016 alone has already eclipsed the total 2015 volume by 172%. With ransomware attacks becoming more and more sophisticated and prevalent, we believe that the threat will potentially cause more damage going into the second half of the year.

This post is meant to tell you exactly what we think you should do if you’re looking at a ransomware screen. Most importantly, here’s what you shouldn’t do …. pay the ransom. I can’t emphasize that enough: don’t pay the ransom.  Continue reading

GDPR: Getting ready for 2018

eu_last1Two years after the regulation was first announced, the progress is visible but it’s slow. As often happens with regulation, it’s going to take a whipping boy to understand the gravity of the situation for most organisations. One high-profile case of a company handing money over for non-compliance under the General Data Protection Regulation (GDPR) will be the required wake-up call the rest of the industry needs to get their act together. Continue reading

Keeping Your Sanity Securing IaaS, PaaS, and SaaS Cloud Services – Part I 

Defending multiple cloud service types as one

In most organizations today, cloud services are a fact of life. Whether you’re deploying and managing servers in the cloud, building on top of a globally distributed platform, or consuming constantly updated services, the cloud is a fundamental part of your IT service delivery…whether you know it or not.

Continue reading

Hackers are hitting hotels hard: Tips for travelers and operators 

Let's review the latest string of incidents targeting hotels and assess some possible prevention methods for the future, including how individuals can travel safer, as well as how hotel administrators can boost their overall security posture.Point-of-sale malware has become an infamous source of headaches for retail IT. Memory-scraping malware and POS skimmers especially have wreaked havoc on small and medium-sized businesses, including boutiques and restaurants, mainly as a way to steal customer payment data. Even large, global retailers such as Target have been negatively impacted by the malicious feats of POS hackers. Continue reading

Security webinars coming up

In marketing and communication there’s a trend not to mention products too often, but rather focus on the benefits, the problems that are tackled, etc. We are all in favor, but  that doesn’t mean you should neglect proper education and training.

In the coming months we will be sharing insights in three key Trend Micro solutions, starting with OfficeScan – that can defend you against ransomware – on April 15th. Just click here to sign up!
Continue reading

The inside job: How hackers are stealing data from within

Is-your-company-safe-from-internal-threats_459_40107048_0_14123204_300-300x200Data breaches have a pretty specific public perception these days. Media focus on cyber attacks resulting in the loss of private information has led many to believe that outside hackers are the only way companies can lose control over their data. While these events obviously need to be taken seriously, recent Trend Micro research has found that only one quarter of breaches can be linked to cyber criminals. Continue reading

Email may not be a safe mode of communication

Email-may-not-be-as-secure-as-many-people-might-think-_459_40114168_0_14014054_300-300x225Email has moved into the center of communications. This is especially true within the business sector, seeing as The Radicati Group discovered that the average employee sends and receives 122 emails every day. This digital means of discussion is incredibly convenient and quick, but it is far from a perfect system.  Continue reading

Mobile devices in healthcare: how secure are they?

Health-care-devices-need-to-be-secure_459_40106460_0_14117435_300-300x200Trend Micro researchers noted that the future of mobile tech in health care is bright. Wearable devices and technologies driven by the Internet of Things are beginning to contribute to a better health landscape. For instance, these wearables can track fitness levels and even blood sugar for those with diabetes, and they will soon be (or in some cases already are) able to track blood pressure, heart rate and respiratory rate, among other important metrics. Continue reading

What not to do in 2016: A list of “don’ts” for CIOs

CIOs 2016Last year was a big year for cyber security – and not necessarily in a good way. A few high-profile data breaches made the news, according to Network World, including several that involved health insurance companies (e.g., Anthem and Premera) and one huge breach on an important federal government office (the Office of Personnel Management). The latter especially was cause for concern, as the confidential information of almost 22 million current and former federal employees was stolen, along with the biometric data of 5 million people. Continue reading