TrendMicro

SecurityTrendMicro

Information security: How Hackers Leverage Stolen Data for Profit

Credit to Author: Trend Micro| Date: Wed, 31 Oct 2018 13:00:02 +0000

Data theft is inarguably big business for hackers. This has been proven time and time again when big-name companies and their customers are involved in a data breach. As these instances appear to take place more often, and the number of stolen or compromised files continues to rise, it’s worth looking into exactly what hackers…

The post Information security: How Hackers Leverage Stolen Data for Profit appeared first on .

Read More
SecurityTrendMicro

Extending Public-Private Partnerships with Milipol

Credit to Author: Trend Micro| Date: Tue, 30 Oct 2018 16:04:46 +0000

By: Loïc Guézo At Trend Micro, we’ve been protecting consumers, SMBs, enterprises and government customers from the latest threats for three decades now. This has required us to build a global team of experienced researchers, state-of-the-art R&D labs and much more, to fuel our industry-leading cybersecurity solutions. We also understand that there’s a bigger picture…

The post Extending Public-Private Partnerships with Milipol appeared first on .

Read More
SecurityTrendMicro

Ransomware Threat Continues: How Infections Take Place

Credit to Author: Trend Micro| Date: Tue, 30 Oct 2018 14:00:20 +0000

If cybersecurity consultants and IT admins have learned anything of the current threat environment, it’s that ransomware will continue to be a pervasive and dangerous threat to individual users, enterprises and organizations at large. When they first emerged, these infections were unlike anything that tech experts had ever seen, combining strong encryption and blackmail tactics…

The post Ransomware Threat Continues: How Infections Take Place appeared first on .

Read More
SecurityTrendMicro

This Week in Security News: Toll Fraud & Small Business Struggles

Credit to Author: Jon Clay (Global Threat Communications)| Date: Fri, 26 Oct 2018 14:00:27 +0000

Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, learn why telecommunications fraud has turned into a multi-billion euro criminal industry. Also, understand what cybersecurity struggles small businesses still face after the NIST Small Business Cybersecurity Act…

The post This Week in Security News: Toll Fraud & Small Business Struggles appeared first on .

Read More
SecurityTrendMicro

The Patching Problem: Best Practices for Maintaining Up-to-Date Systems

Credit to Author: Trend Micro| Date: Thu, 25 Oct 2018 13:00:54 +0000

“Update ready to be installed.” IT teams and business stakeholders are probably familiar with this notification, or something like it. After all, software updates are nothing new: Whenever a vendor makes improvements or includes new capabilities on a previously-released platform, it comes with a software update. But boosting existing features aren’t the only reason that patching…

The post The Patching Problem: Best Practices for Maintaining Up-to-Date Systems appeared first on .

Read More
SecurityTrendMicro

Best Practices for Endpoint Detection and Response

Credit to Author: Trend Micro| Date: Wed, 24 Oct 2018 13:00:53 +0000

There are many elements that can complicate enterprise security efforts. From the increasing sophistication of cybercriminal strategies and activities to the wide range of components connected to the network, data protection and infrastructure security has become an uphill battle. Another key factor to consider here is the array of different endpoints connected to and communicating through…

The post Best Practices for Endpoint Detection and Response appeared first on .

Read More
SecurityTrendMicro

Small businesses to receive NIST assistance: Overlooked areas of the NIST framework

Credit to Author: Trend Micro| Date: Tue, 23 Oct 2018 13:48:20 +0000

In years past, it was a challenge for organizations across every industry to ensure they were protected against the risks of – and ready to respond to – a cybersecurity incident. Decision-makers and IT administrators alike followed the advice of experts and worked to create strong safeguards and response and recovery plans. It wasn’t until…

The post Small businesses to receive NIST assistance: Overlooked areas of the NIST framework appeared first on .

Read More
SecurityTrendMicro

Safeguarding the Nation’s Critical Infrastructure

Credit to Author: William “Bill” Malik (CISA VP Infrastructure Strategies)| Date: Mon, 22 Oct 2018 14:43:06 +0000

In May of 1998, President Clinton issued Presidential Decision Directive 63: Protecting America’s Critical Infrastructures. This Directive proposed steps to enact the recommendations of the President’s Commission on Critical Infrastructure Protection, published in October 1997. Twenty years on, how are things going? The US Federal government has identified critical infrastructure sectors and associated each with…

The post Safeguarding the Nation’s Critical Infrastructure appeared first on .

Read More