Fortinet

FortinetSecurity

Ransomware: Are You Paying Attention?

Credit to Author: Jeannette Jarvis| Date: Thu, 05 Oct 2017 12:50:59 +0000

If the news about ransomware in recent weeks hasn’t gotten your attention, then maybe the fact that its threat magnitude has grown 35X over the past year will jolt you into a state of awareness. Further, ransomware isn’t a threat confined to just a few industries or geographical regions; it is a global problem facing organizations—and even individuals—of all shapes and sizes. The Magnitude of the Threat Upwards of 4,000 ransomware attacks happen daily, infecting between 30,000 and 50,000 devices each month. The financial…

Read More
FortinetSecurity

Executive Insights: Threat Intelligence: The Fuel that Powers Cyber Defenses

Credit to Author: Michael Xie| Date: Wed, 04 Oct 2017 12:50:59 +0000

For anyone reading the news regularly, it’s not hard to grasp that cyber threats are getting more sophisticated and damaging by the day. From a security technology provider’s perspective, I can add that tackling them is a fast mounting challenge for the millions of businesses that come under attack daily.  Modern cybersecurity technologies – assuming you have already put in place the right professionals, policies, and processes − are a must. But organizations deploying them need to look beyond the boxes that sit on…

Read More
FortinetSecurity

Potential Ichitaro Phishing Vulnerability

Credit to Author: Tien Phung Phan| Date: Mon, 02 Oct 2017 12:45:00 +0000

The FortiGuard Labs team continually tracks phishing and spam campaigns around the world. Sending users macro-enabled documents with a malicious payload is one of the most commonly used malware attack vectors for phishing campaigns. This attack vector has been used by used by such prevalent malware families as Dridex, Fareit, and Hancitor. The key to these sorts of campaigns is luring users into clicking on a malicious file attached to an email message. As a result, malware distributors are always looking for ways to trick users into executing their…

Read More
FortinetSecurity

National Health IT Week: Enabling Digital Transformation with Integrated Network Security

Credit to Author: Susan Biddle| Date: Mon, 02 Oct 2017 12:50:59 +0000

Over the past ten years, technology has transformed healthcare substantially. From electronic health records that simplify the collection and sharing of patient information, to digital consultation and other services provided remotely, to wearable connected medical devices, healthcare is becoming more accessible, accurate, and patient-focused. National Health IT (NHIT) Week, which will take place from October 2nd- 6th, is a collaborative and partner-driven event that aims to increase awareness of the many ways new health IT initiatives stand…

Read More
FortinetSecurity

Redefining Next Generation Firewalls

Credit to Author: Nirav Shah| Date: Thu, 28 Sep 2017 12:50:59 +0000

When the first firewalls were developed and deployed, their primary role was to act as sentinels monitoring traffic moving into, and sometimes out of the network. These devices would look at packets, network addresses, and ports to determine if data should be allowed through or blocked. A good analogy is airline travel. In the first few iterations of the firewall, data was simply checked to see if it had a ticket, and if its credentials were in order it were allowed to board the plane. Then application traffic took off, and first generation firewalls…

Read More
FortinetSecurity

Today’s Best Practices for Protecting the Distributed Network

Credit to Author: Matthew Pley| Date: Wed, 27 Sep 2017 12:50:59 +0000

In the new digital economy, businesses that are able to adapt will be the most competitive and successful. This will require adopting new technologies, networking systems, and strategies. But many of the emerging technologies and strategies that are being deployed across our networks come with a set of unknowns that are having a huge impact on security. The reason is that traditional approaches to security were never really designed to protect dynamic, borderless, and hyper-connected environments. Many Factors Are in Play For example,…

Read More
FortinetSecurity

All Roads Lead to Rome: Critical Infrastructure Security at the Crossroad

Credit to Author: Phil Quade| Date: Tue, 26 Sep 2017 12:50:59 +0000

Prosperous nations sometimes take for granted the safe and reliable critical infrastructures that underpin our economies, governments, and personal well-being.  Similar to how we marvel today at the Roman Empire’s aqueducts, the 3rd millennium will likely do the same with today’s critical infrastructures.  That is, if they don’t lead to our downfall. Our Strength, Our Weakness The common understanding of the phrase ‘all roads lead to Rome’ is that there are many different ways to reach a goal. …

Read More
FortinetSecurity

Benefits of Using CASBs in Financial Services

Credit to Author: Bill Hogan| Date: Tue, 26 Sep 2017 12:50:00 +0000

The financial services sector is one industry benefiting from cloud adoption, not only from the increased services they can provide consumers, but also through cloud-enabled solutions. Bank employees require access to SaaS solutions and CRMs enabled by the public cloud that simplify daily tasks, such as Fiserv and Salesforce. These solutions use cloud computing and storage to optimize operations, putting adopters at a distinct advantage in several key areas.

Read More