A new family of malware with an apparent connection to the notorious Ryuk ransomware was uncovered — but instead of encrypting files, they were found targeting government-, military-, and finance-related files.
Continued innovations in mobile technology enable businesses to respond to growing demands. Here are some best practices to make sure that the whole enterprise is protected against constantly evolving threats.
The GDPR is fast approaching and it is important to identify the weak links in your enterprise. Where can security be improved? Past experience has shown that third party suppliers are particularly susceptible to attacks.
Proper network segmentation is the most critical proactive step in protecting networks against targeted attacks. See why it's important for organizations to properly identify and categorize their own users and the networks they access.