Operations | Monitoring | ITSM | DevOps | Cloud

Data Breaches

5 Reasons Why a Secure Server is Necessary for your Website

By 2020, the cost of a data breach would amount to a whopping $150 million! No industry is safe from such violations. Did you know that after every 39 seconds, there is a hacker attack on computers and websites? Think about how many cyber-attacks might happen as you are reading this. Your business and website can be one of them unless you take the necessary measures to secure your platform.

7 Signs of an Attempted Data Breach- and How to Stop It in Its Tracks

Data breaches come in all shapes, sizes, and levels of exposure. They can range from a couple of log files unintentionally left available to the public to the leak of hundreds of thousands of users’ personally identifiable information (PII). Don’t think that just because you have a secure network, a leak can’t happen to you.

Latest Marriott Breach Puts Focus on GDPR

A massive data breach at Marriott and Starwood Hotels and Resorts has put the General Data Protection Regulation (GDPR) back in the spotlight. As the hotel chain faces record fines under the GDPR, privacy experts are again extolling the importance of secure log management practices to avoid suffering a similar fate as Starwood.

Detecting Data Breaches by Example - Vision Direct

Just as we were getting ready to launch our Data Breach Monitor, we heard the unfortunate news that fellow Yorkshire based business Vision Direct had suffered a malware attack, which resulted in the loss of financial data of around 6,600 customers. So we asked ourselves, could we have detected the same attack using our new monitor? The only way to find out was to infect a website and see what would happen…

Conquer it with correlation-Part 2: The data breach

In my previous post, we looked at how event correlation can be used to deal with advanced persistent threats (APTs). The thing is, an APT is just one ugly face of a much larger epidemic: the data breach. In this blog, we examine this larger problem and the role of event correlation in securing sensitive data.

Fantastic Data Breaches (and how to defend against them)

The retail world is under attack. Hackers across the globe are stealing personal details – including credit card information – on an alarmingly regular basis. This is done by placing digital “credit card skimmers” on compromised e-commerce sites. Hackers are able to access these sites usually through 3rd parties software in the form of JavaScript. Major retailers are prime targets – they are not immune and it’s a becoming a BIG problem for everyone.

The Top 6 Cyber Threats that Keep Businesses up at Night

Few things put more fear into the hearts of IT departments than the thought of a massive cyber attack — and for good reason. In 2017, the average cost of security breaches for U.S. organizations was estimated at $3.5 million. But it’s not all about the money. In addition to the financial burden caused by cyber attacks, the loss of client trust and credibility post-breach can be extremely difficult to bounce back from.