The 2018 Cost of Data Breach Study: Impact of Business Continuity Management (BCM) sponsored by IBM, analyzes the financial and reputational benefits of having a BCM program in advance of a data breach.
According to the research, BCM programs can reduce the per capita cost of data breach, the mean time to identify...
Cyber-resilience combines the best practices from IT security, business continuity, and other disciplines to create a business strategy more in line with the needs and goals of today's digital business.
Download this white paper and learn:
How digital transformation is breaking down the traditional safeguards...
A business disruption caused by cyberattacks corrupting your critical data and configurations of your systems can be as damaging to an organization's financial well-being and reputation as data theft or a complete IT outage.
This can be especially true when cyberattacks involve data encryption or malware...
The challenge when designing technology for critical national infrastructure sectors is that it must be securable today and remain resilient to cyberattacks for decades to come, says cybersecurity Professor Prashant Pillai.
Criminals wielding crypto-locking ransomware - especially Dharma/CrySiS, GandCrab and Global Imposter, but also SamSam - continue to attack. Insurance firm Beazley says cyber claims for ransomware have increased in recent months, with the healthcare sector hardest hit.
An Iowa eye clinic and its affiliated surgery center recently recovered from a ransomware attack on their common systems within one day and without paying a ransom. This case offers important reminders to other healthcare entities and their vendors about advance planning.
A tale of two different ransomware victims' responses: One Connecticut city says it had little choice but to pay a ransom to restore crypto-locked systems. But a North Carolina water utility hit separately says that rather than bow to criminals' demands, it will rebuild affected systems and databases.
The biggest challenge for any critical infrastructure facing potential cyberattacks is devising ways to maintain business continuity, says cybersecurity specialist Prashant Pillai, who calls for building resilience into network design. He'll be a speaker at ISMG's Security Summit: London, to be held Oct. 23.
Scotland's Arran Brewery fell victim to a Dharma Bip ransomware attack that infected its Windows domain controller and crypto-locked files and local backups, leading to the loss of three months' worth of sales data. The brewery refused to pay the attackers' two bitcoin ransom demand.
IT needs to be able to respond fast in an emergency, such as a natural disaster, or malware, security breaches, cyberattacks, and ransomware extortions that result in outages.
Download this white paper to ensure your hybrid cloud is still available in the event of catastrophe by:
Decoupling applications from...
CISOs and CIOs must ensure their organizations plan for worst-case scenarios, conducting frequent "dry runs" of disaster recovery plans, says Tonguc Yaman, CIO of SOMOS, a New York Community Care Network, who formerly served as deputy CIO of Bellevue Hospital.
A recent incident involving a chronic care management company spotlights how paying a ransom to recover decryption keys from ransomware attackers can put sensitive data at additional risk. Security experts offer insights on how to prepare for the many challenges posed by attacks.
The latest edition of the ISMG Security Report offers an update on how Russian bots and trolls are spreading misinformation on vaccines via social media - and the public health impact of the campaign. Plus: Tips on disaster recovery, internet of things security.
In today's environment, where government is run by technology, business continuity is a necessity.
This white paper discusses a new active/active stretched cluster technology that allows government agencies to achieve the highest levels of business continuity without the costs and complexities that have typically...
Can you afford to lose $740,357? That's the average cost of a data center outage, according to the Ponemon Institute.* That's just one reason that IT needs to be able to respond fast in an emergency, such as a natural disaster, DNS attack, ransomware, malware, or any other type of outage. With a growing number of data...