Cyber Attacks

Why Maintaining Your Online Security is Vital to Your Business

There is no doubt that threats from cyber attacks are a serious problem for businesses. Companies of all sizes have been the subject of attack, and it can lead to serious problems for customers and clients. Making sure that your companies security is high is important not only to your company as a whole but also for your customer's confidence. Here are some of the ways you can help to maintain the security of your company.

Consider Online Solutions

One way that you can increase your security is to transfer your systems to the cloud. By having all of your data and personal information off-site, you are protected by another level of security. It doesn't just work for your business systems; you can also use it for your servers. Instead of having your own server in the office, you can rent dedicated servers from many companies. It means you can essentially treat it as your own server, although you benefit from expert technical support, flexibility as well as heightened security.

McAfee Integrates Advanced Analytics to Increase Security Operations Center Efficiency and Protect Endpoints and Cloud

Grazed from McAfee

McAfee, one of the world's leading cybersecurity companies, today announced new endpoint and cloud solutions that go beyond machine learning to take advantage of the speed and accuracy of advanced analytics, deep learning and artificial intelligence, and increase efficiency of security operations. Cyber threats and the data needed to defend against them continue to increase, overwhelming security teams and driving the need for open, efficient security operations. McAfee's new solutions make use of the automation, reasoning and data curation uniquely provided by advanced analytics technologies, allowing security teams to easily discover and assess data and root out threats. Through human-machine teaming and an open and interoperable cybersecurity platform, McAfee proves ‘Together is power,' with collaborative security that defends against shared adversaries.

"Security teams are increasingly overwhelmed by the complexity they face in their environments which hinders their ability to defend against the growing number of threats," said Chris Young, CEO of McAfee. "McAfee is acting on our ‘Together is power' principle with collaborative security that combines the unique advantages of people, machines and partners enabling teams to be situationally aware of security events and take swift action to thwart assaults, from the endpoint to the cloud."

FileCloud Unveils 'Breach Intercept' to Safeguard Organizations Against Dramatic Increase in Cyber Attacks

Grazed from FileCloud

FileCloud, the cloud-agnostic EFSS platform, today announced FileCloud Breach Intercept. The newest version of FileCloud offers advanced ransomware protection to help customers handle every phase of a cyberattack: prevention, detection and recovery.

FileCloud is deployed across 90 countries and has more than 100 VARs and Managed Service Providers across the world. Deployed by Fortune 500 and Global 2000 firms, including the world's leading law firms, government organizations, science and research organizations and world-class universities, FileCloud offers a set of unique features that help organizations build effective anti-ransomware strategies.

Global ransomware damage costs are expected to total more than $5 billion dollars in 2017, compared to $325 million dollars in 2015. Ransomware is growing at an estimated yearly rate of 350 percent with business enterprises becoming the priority target for hackers. Enterprise File Sharing and Sync (EFSS) solutions have seen an increase in ransomware attacks with 40 percent of spam emails containing links to ransomware. Whereas public cloud EFSS solutions such as Box and Dropbox offer centralized targets for ransomware attacks, FileCloud's decentralized private cloud reduces your company's exposure to potential attacks.

Data Security Guidance for Small Businesses

With high profile cyber attacks occurring on a regular basis, people who run small businesses are becoming increasingly concerned about their data security processes. For regulated businesses, there is a requirement to provide evidence that the company complies with the minimum requirements. For small businesses that don't have the same level of scrutiny as the larger, highly regulated businesses it can be harder to find support and guidance on responsibilities. 

However, businesses of all sizes must start paying more attention to the threat of cyber attacks, given that the type of businesses that criminals are targeting varies from a small start-up business to a global company that is a household name. Recently we have seen numerous cyber attacks hitting the news headlines, such as payday loan company Wonga who was subjected to an attack, leaving 245,000 customers affected. 

Cloud Computing: Google, Facebook at Center of EU Clash Over Cyber-Attack Law

Grazed from Bloomberg.  Author: Kit Chellel.

Google Inc. and Facebook Inc. are caught in the middle of a clash between European Union lawmakers on whether the U.S. technology giants should be covered by rules forcing companies to report cyber attacks to government agencies in the 28-nation bloc.

While the European Commission wants search engines and social networks included in a revamped law on network and information security, some lawmakers favor a more streamlined approach focusing on critical infrastructure such as banks and power stations...

Cloud Computing: How Secure Is Your Small Business? 5 Tips to Protect Against Modern Cyber Attacks

Grazed from Entrepreneur. Author: John Mason.

Today, technologies like cloud computing, mobility, social, and big data and analytics are enabling small- and midsized businesses (SMBs) to do more with less, reach new markets and focus on creativity and invention instead of IT. But with all this new opportunity comes responsibility. Whether an SMB is moving to the cloud or implementing a bring your own device (BYOD) mobile program, security should be part of the plan.

Each year, cyber crime costs the economy about $445 billion, according to the Center for Strategic and International Studies, and SMBs can be attractive targets for hackers tapping into this profitable black market. SMBs tend to have weaker online security, use cloud services void of strong encryption technology and lack the robust IT and internal policies needed to protect against increasingly sophisticated cyber-crime rings, which operate with an enviable efficiency and effectiveness...

Read more from the source @ http://www.entrepreneur.com/article/246473

Cloud Computing: Palo Alto Networks - Proactively Averting Cyber Attacks

Grazed from SysConMedia.  Author: Charles Hall.

Cyber threats are becoming more advanced, persistent, and focused. The threat landscape is rapidly changing, and evolving faster than ever. Today it is difficult to determine who is winning: either those behind the cyber threats, or those fighting to prevent and remediate the threats. The strategy against cyber threats has been to throw more and more technology at the problem, in an attempt to keep up, and it is not working.

What if there was a way to prevent a cyber attack before it could ever happen? While no solution will prevent 100% of attacks, the goal should be to get as close as possible. Moving to a more proactive solution makes it increasingly difficult for attackers to achieve successful attacks...

Read more from the source @ http://www.sys-con.com/node/3284302

Cloud Computing: The perimeter's breached - encrypt everything!

Grazed from SCMagazine.  Author: Tony Morbin.

Last year's slew of criminal data breaches made it clear that the perimeter has fallen and the privacy of our data is at risk – whether that be passwords and credit cards or celebrity pictures and corporate secrets, while government agencies from China, Russia and the west continue to demonstrate vast intelligence surveillance capabilities.

One of the most effective responses for corporations, governments or individuals is to take a data- centric approach using encryption, potentially making data useless to intruders, or at least, raising the cost of access.  Late last year SC Magazine UK editor in chief Tony Morbin interviewed Alan Kessler, president and CEO, Vormetric, to get an industry view on issues in the commercial encryption market...

Cyber attacks move to cloud with increased adoption, report shows

Grazed from ComputerWeekly. Author: Warwick Ashford.

Cyber attacks on cloud environments have almost reached the same level as attacks on traditional IT, with increased adoption of cloud-based services by the enterprise, a study shows. The 2014 Cloud Security Report by security-as-a-service provider Alert Logic is based on an analysis of data from cloud and on-premise infrastructures of 2,200 customers.

In the past year, brute force attacks on cloud environments climbed from 30% to 44% of customers, and vulnerability scans increased from 27% to 44%, the study found. Brute force attacks typically involve a large number of attempts testing multiple common credential failings to find a way in, while vulnerability scans are automated attempts to find a security weakness in applications, services or protocol implementations that can be exploited...

Cloud Computing: Suspected Russian spyware Turla targets Europe, United States

Grazed from Yahoo. Author: Peter Apps and Jim Finkle.

A sophisticated piece of spyware has been quietly infecting hundreds of government computers across Europe and the United States in one of the most complex cyber espionage programs uncovered to date. Several security researchers and Western intelligence officers say they believe the malware, widely known as Turla, is the work of the Russian government and linked to the same software used to launch a massive breach on the U.S. military uncovered in 2008.

It was also linked to a previously known, massive global cyber spying operation dubbed Red October targeting diplomatic, military and nuclear research networks. Those assessments were based on analysis of tactics employed by hackers, along with technical indicators and the victims they targeted...