Unidentified group of hackers breached the City of Baltimore’s IT infrastructure in a cyberattack using ransomware known as, “RobbinHood.”
Yet another critical ransomware threat has taken the world by storm. Speculation will be rampant on the source of the attack over the next few days as we begin to unfold the layers of the code.
Advanced Persistent Threats (APTs) use technologies, people, and processes over an extended time to defeat your defenses. If your defenses don’t incorporate those three pieces chances are your data and Intellectual property (IP) are at risk.
Let’s expand on implementing a data-centric security program, and specifically on encryption. Encryption in one form or another has existed for thousands of years for one reason – it works.
The coverage and ensuing public fascination with the outage at Hollywood Presbyterian did as much to showcase the capabilities of well-written malicious software as it did to highlight the vulnerabilities of healthcare technology.