ComputerWeekly.com Research Library

Powered by Bitpipe.com

All Research Sponsored By:Cisco Umbrella

  • Navigating Ransomware Recovery

    The decisions and road to recovery will involve several stakeholders and real costs. So, when organizations must make the tough decision of whether to pay a ransom, rebuild the system, or file a report, there are many factors to consider. Use this e-guide to help you plan and map out steps to avoid rushing into bad choices that can’t be reversed.

  • A Guide to Navigating the Modern Health IT Infrastructure

    Ransomware is one of the most common attacks used to hold data hostage, especially in healthcare, and that helped increase the use of digital currencies like Bitcoin. In this e-guide, learn how to defend against threats like ransomware and cryptojacking and how deception technology can help.

  • Rise in Ransomware Attacks Prompts New Prevention Priorities

    Officials predict that already widespread ransomware attacks will only grow in scale and influence, while urging organizations to act now to guard against them. In this e-guide, learn what officials are saying about the upcoming storm of ransomware attacks and what your company can do in terms of prevention.

  • Ransomware Attacks: How to Get the Upper Hand

    The rock group Radiohead is celebrated for its unconventional approach to recording and releasing music. Lately, the band is also turning heads for how it handled a hacker trying to sell its unreleased work. In this e-guide learn what security experts think of Radiohead’s strategy for dealing with the ransomware threat.

  • Create an Effective Email Phishing Test in 7 Steps

    The best way for IT to improve email phishing security is through comprehensive testing, which helps identity which users are susceptible and what type of fake email is more effective. Dive into this e-guide to learn how to create an effective email phishing test in 7 steps.

  • Create an Effective Email Phishing Test in 7 Steps

    In this expert guide, find out how you can create an effective email phishing test in 7 steps to see how vulnerable your organization really is.

  • Securing the SD-WAN: The Next Network Challenge

    How does adopting SD-WAN affect security? Download this expert guide for tips on securing SD-WAN, and find out why security is an essential part of the migration process.

  • Healthcare Security: How You Can Ward Off Insider Threats

    One of the greatest healthcare security threats comes from users within an organization. In this expert handbook, John Nye shares recommendations for technologies that healthcare organizations can use to fight against insider security threats.

  • Cryptojacking Attacks May Not Challenge Ransomware Dominance

    Cryptojacking attacks are on the rise, but experts are unsure if the threat can overtake ransomware as the cryptomining strategy of choice.Do you think cryptojacking could become more common than ransomware? Industry experts weigh in on the future of cryptomining inside.

  • Cryptojacking Emerging as a New Threat to Healthcare

    With the increasing trend of cryptojacking, organizations must take action against attackers looking to take advantage of their environment. Discover which appropriate steps you can take to fight cybercrime today.

  • How to Prevent Cloud Cryptojacking Attacks on your Enterprise

    Cloud cryptojacking attacks are a newer threat targeting enterprises. Cybersecurity expert Rob Shapland – an ethical hacker who specializes in simulating advanced cyberattacks against corporate networks – explains what safeguards you should have in place to prevent these attacks.

  • Enterprises Wear Large Targets in Cloud Cryptomining Hacks

    Cryptojacking, the unauthorized use of a computer to mine cryptocurrencies, is on the rise and has put security teams on alert. For this reason, enterprises are adjusting their strategies and applying dedicated approaches to cloud security. Read on to find out how your organization can join this trend to protect its most sensitive data.

  • 6 Ways to Prevent Ransomware in Health IT

    With so much at risk for healthcare organizations, IT must implement proactive steps to help mitigate their risks and keep attacks at bay. In this e-guide, you'll uncover the ins and outs of 6 ransomware prevention tips healthcare organizations should include as part of their ongoing security strategy.

  • By the Numbers: Ransomware and Patient Data Breaches in Health IT

    Take a look at how ransomware and malware strikes on healthcare organizations intensified last year, doubling to 64 incidents reported to federal officials. This e-guide is packed with data surrounding this security epidemic in the healthcare industry.

  • Ransomware Attacks Plaguing Health IT

    Learn from Mike Fisher, health IT privacy lawyer about how cybersecurity concerns have shifted from data breaches to ransomware and malware exploits that shut down hospitals and threaten patient safety.

  • IT Security Trends to Know

    The 2017 TechTarget IT Priorities Survey reports a number of key IT security trends about where enterprises and infosec professionals place their time and resources. In this expert e-guide, get the results from this survey and see how 971 IT pros plan to focus their cybersecurity efforts.

  • Could the WannaCry Decryptor Work on Other Ransomware Strains?

    After the global outbreak of the WannaCry ransomware, researchers created decryptor tools that could save affected files. In this guide, expert Matthew Pascucci explains how the tools work and if they work on other ransomware strains.

  • Cisco Opens Umbrella, a Cloud-based Secure Internet Gateway

    Cisco launched Umbrella, a cloud-based secure internet gateway, to tackle cloud and mobile security risks. In this expert e-guide, learn more about this tool, as well as insights into soaring global mobile data traffic.

  • Why Healthcare Ransomware Attacks are a Growing Threat to Health IT

    There are several factors that leave hospitals vulnerable to ransomware attacks, including the use of legacy systems and the fear of financial penalties due to a data breach. Discover some of the reasons why healthcare systems are experiencing more frequent and costly ransomware attacks.

  • Hospital Network Security: Recursive DNS Lookups Yield Threat Insight

    Uncover how the University of Kansas Health System adopted a security strategy leveraging DNS to block threats and reduce ransomware attacks.

  • How Hospitals Can Combat Ransomware Attacks

    Learn what separated WannaCry from other ransomware attacks, as well as what hospitals can and should be doing to combat future ransomware attacks.

  • Ransomware and Cloud Security: Keys to Stop the Threat

    Highly complex threats are targeting corporate assets and resources every day. In this e-guide, security expert Kevin Beaver reveals 5 ways to prevent a ransomware infection through network security and assistant editor Kathleen Casey explores 5 ways to fend off cloud security threats.

  • Securing DNS: What to Do, and What to be Aware of

    In order to understand how DNS attacks work, it is important to understand DNS security weaknesses. In this e-guide, security pros Peter Wenham and Vladimir Jirasek reveal best practices and recommendations for securing DNS and staying ahead of its vulnerabilities.

  • Tech to Protect Against Ransomware, Ensure Hospital Data Security

    Keith Jennings, CIO at Mass General Hospital in Boston, and Andrew Rosenberg, M.D., interim CIO at the University of Michigan Health System in Ann Arbor, discuss key technology and strategies to prevent ransomware attacks.

  • Healthcare Ransomware Attack: Prevention and Backups Are Critical

    In this e-guide, explore 6 pointers for preventing ransomware attacks according to Harun Rashid, VP of Global Health Services and CIO of Children's Hospital of Pittsburgh of UPMC.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.