Data Protection

Data Protection news, analysis, research, how-to, opinion, and video.

insider threats
Digital Key, security, encryption

00 phishing money hook

How to avoid phishing attacks

Eyal Benishti, CEO of IronScales, provides some best practices to raise employee awareness and mitigate phishing risks. Remember, cyber criminals are lazy. If your organization is a tough nut to crack, they will move on to find more...

What is the right DDoS protection cloud service for your organization?

An expert’s eye view into how top DDoS protection cloud services perform on many levels.

mature man peeking through window blinds 200136043 001

SOURCE Boston: Confronting the insider threat

The insider threat remains – it is hard to detect malicious employees when security tools are designed to block and catch outsiders. But technology that tracks employees’ online and network behavior can set off alarms when it strays...

Digital Key, security, encryption

TeslaCrypt victims can now decrypt their files for free

Victims of the widespread TeslaCrypt ransomware can now decrypt files affected by recent versions of the malicious program.

law books

10 ways law firms can make life difficult for hackers

Everybody is a target of cybercrime, but some are more attractive than others. Law firms rank pretty high on the list because of the sensitivity of the information they handle, and their sometimes very rich and powerful clientele.

1 linkedin

A hacker is selling 167 million LinkedIn user records

A hacker is trying to sell a database dump containing account records for 167 million LinkedIn users.

Digital Key, security, encryption

Researchers crack new version of CryptXXX ransomware

Researchers from Kaspersky Lab have developed a method of decrypting files affected with the latest version of CryptXXX, a malware program that combines ransomware and information stealing capabilities.

<HOLD UNTIL JUNE FOR CW COVER> digital europe circuit board barbed wire barrier obstacle thinkstock

EU’s data privacy regulations put the pressure on IT

European Union authorities are requiring companies that handle EU citizens' data to comply with some of the strictest data privacy regulations in the world -- or pay a steep price. 

petya ransomware logo

Petya ransomware is now double the trouble

The Petya ransomware now bundles a second file-encrypting program for cases where it cannot replace a computer's master boot record to encrypt its file table.

cyber security

4 big plans to fix internet security

Internet security is in crisis. These four proposals offer tangible solutions -- including one scheme to change the Internet's workings from top to bottom

hunting orange

The sport of threat hunting, and who should be in the game

"Hunting is not a sport. In a sport, both sides should know they're in the game." - According to Field and Stream magazine, this is an oft quoted hunting expression. I couldn’t resist the irony of applying this quote to the cyber...

Scissors cutting money for budget slashing

Where to cut corners when the security budget gets tight

Whenever creating a budget, there is always the rainy day fund in case of unexpected circumstances. But what if those circumstances are bigger than you could have ever imagined? And you don’t have cyberinsurance? Sure you might be up...

emv chip and pin

State of EMV report: Fraud rises before a fall

Counterfeit fraud losses for retailers will hit $4.5 billion in 2016; fall to $1 billion by 2020.

boxer fighter punch

10 companies that can help you fight phishing

According to the most recent Verizon data breach report, a phishing email is often the first phase of an attack

privacy policy

Privacy policy or privacy notice: what's the difference?

Is there a difference between a privacy policy and a privacy notice? Some of the confusion comes from a company’s description of their privacy practices on their website being called a privacy policy. Some people ask, “Isn’t the...

A paranoid user with a laptop computer looks around suspiciously. [credit: Thinkstock]

5 secure habits of the paranoid PC user

Are you getting a little sloppy with your security? Time to shape up. Practice these five habits to protect your data at home, in the office and out in the world.

Panama papers

Panama Papers leak explained: What you need to know about the Mossack Fonseca hack

Offshore tax shelters may pay, but scrimping on security doesn't.

planning

How to perform a risk assessment

A risk assessment gives you the information protection equivalent of the opposing team’s playbook, telling where and how attackers are most likely to strike and what the damage will be.

Load More