Data Exfiltration – Do You Know Where Your Stolen Data is Going?
Understanding who's trying to steal your data and what they plan to do with it is essential in helping to protect your business from data exfiltration.
Why Ransomware Extortion is a Threat
The majority of ransomware attacks now include some form of extortion attempt. What is ransomware extortion and how can you defend against it?
Ransomware Insurance: Why it’s Only Part of the Solution
While ransomware insurance is often a key piece of the puzzle when it comes to dealing with these attacks, organizations should not let this lull them into a false sense of security, as these policies have many limitations.
Should You Pay a Ransomware Demand?
What should you do if you receive a ransomware demand? Will paying the ransom ensure you get your data back?
Data Security: Protecting the Crown Jewels
Data security is one of the most important concerns for any organization to ensure customer data, trade secrets and commercial data doesn’t fall into the wrong hands.
Industrial Spy: Selling Stolen Data to Competitors
Industrial Spy is a new way of selling stolen data of victims to competitors. Companies can buy their competitors’ trade secrets for millions of dollars – or as little as $2.
Beyond the Ransom: The True Cost of Ransomware Attacks
The True Cost of Ransomware Attacks highlights the downtime costs, reputational damage and the cost of new security implementations when trying to recover from a ransomware attack.
Data Exfiltration 101: How Threat Actors Compromise Networks
Data exfiltration 101 describes the types of attacks that lead to data exfiltration and why 83% of all attacks rely on it as the primary vector.
The New Insider Threat: Are ransomware groups recruiting your employees?
Ransomware groups are using increasingly sophisticated technology and infrastructure to carry out attacks while adopting new tactics to pressurize their victims such as recruiting your employees.