Some lessons are better learned by observing what happened to others, like the negative consequences of successful cyberattacks. How to protect your organization and data is knowledge you want to acquire without experiencing a breach. The scenarios below illustrate what can go wrong and how you can prevent similar situations at your organization.
1. Kaiser Permanente says data breach exposed information on nearly 1,000 Sacramento-area patients
The personal information held by Kaiser on 990 Sacramento-area patients was breached in September by an unknown and unauthorized individual. The cybercriminals had access to an email account with access to data including date of birth, gender, provider name, payer name and benefits information, along with other medical-care-specific information.
Unlike credit card and other financial information, personal health histories do not change and can be used to convince individuals that a scam is actually legitimate. At DiamondIT, we have tools and systems in place to identify, analyze and proactively monitor for any compromised or stolen employee and customer data. This prevents personal information from being used against you, your customers or employees.
Data is the DNA of any business or organization. And your data – whether it’s research and development, payroll information, client payment details, or any other mission-critical information – is up for grabs by cybercriminals who want nothing more than to sell stolen data on the dark web.
Have you received what looks like a very legitimate email suggesting you need to upgrade your Microsoft 365 account? Maybe the IRS sent you a notification regarding a “critical alert” via email? If so, do not engage! A new wave of phishing attacks is trying to get users to respond to fake emails that could easily infect your computer with a virus that can compromise your passwords.
Now that we are a few months into 2018, security analysts are able to look back on 2017 and analyze leading cybersecurity trends. Not surprisingly, according to the Cisco 2018 Annual Cybersecurity report, there was an elevenfold increase in malware last year.
“Adversaries are becoming more adept at evasion— and weaponizing cloud services and other technology used for legitimate purposes,” the report declares.
The following are some of the major cybersecurity trends of 2017:
Ransomware Families Up 32%, Total Ransomware Threats Down 41%
According to Dark Reading, the growth in ransomware attacks hit a plateau, while the number of ransomware families rose considerably. As cybercriminals become more adept in targeting individuals and organizations, the variety of ransomware attacks are evolving. Not surprisingly, the WannaCry variant dominated the landscape – making up 57% of all ransomware detected last year.
It seems a full week can’t go by without another headline about an organization getting breached. Whether it’s a new phishing scheme, a major malware attack on a city municipality or a strategic ransomware threat, the dangers are real, and the costs can be extraordinary. The cybersecurity landscape continues to evolve and as modern technology advances, security threats do as well. What protections do you need in place for you to sleep better at night?
In 2017, the world saw the rise of ransomware as the names of famous ransomware attacks permeated the news such as Petya, Goldeneye and more. According to Secplicity, “…malware is at an all-time high, global ransomware damages are predicted to exceed $5 billion, and data records are being stolen by hackers at a rate of more than 5 million a day.”
Recent complex vulnerabilities in top-tier computer devices, iPhones, Windows PCs, Android devices and other gadgets have sent companies and individuals alike in a tailspin. A critical security flaw has been detected in processor chips that allow bottom barrel IT processes to have access to memory in the computer’s kernel – aka the most privileged IT process of the device.
Hackers could potentially exploit this issue giving them a clear path for installing malicious software to read memory through this new group of side-channel attacks and putting data, hardware and software at serious risk.
Here are the immediate steps you need to take to make sure your data and infrastructure are protected:
Shadow IT and Shadow Data: How Organizations Can Protect Against the Use of Unsanctioned Applications
When we think of cybercrimes we often think of criminals hacking into a network to retrieve sensitive corporate information. But cyberattacks and the leaking of information can also occur from within an organization in the form of Shadow IT and Shadow Data.