data breach Tag

Ransomware as a Data Breach Decoy

Gone are the days of small-time cybercriminals using ransomware to earn a quick buck. Ransomware--and the criminals who use it--have certainly evolved. Though it initially made a name for itself as a tactic of the lesser-skilled criminal, malicious actors are now exploiting the established expectations of its impact and limitations in order to hide inside a network.  For those organizations with robust security strategies, ransomware had become little more than an annoyance. They were able to recover rather quickly using backups. More often, though, that’s not the case. In the past...

Share Post

Lower the Price Tag of a Data Breach with Threat Intelligence

Detecting and containing a data breach takes the better part of a year, approximately 280 days, for the average organization, according to IBM’s 15th annual Cost of a Data Breach Report, Unfortunately, the longer it takes to identify a breach, the bigger the price tag of the overall breach lifecycle.  This year’s report found that more than half (52%) of breaches are the work of malicious actors. Of those, 13% of breaches are reportedly caused by nation state attackers.The findings also revealed that more attackers are using compromised credentials and leveraging...

Share Post