This article was originally published in Enterprise Security Magazine.  Republished with permission. “Whether the cybercrime is holding data at ransom prior to release of encryption keys, or laying in wait for a time to execute a worm or virus, one certainty is that these events will continue” The world of malware and cyber threats has grown significantly since the early 90s, when PC Cyborg, the first known ransomware attack occurred. With a disgruntled biologist, and 20,000 floppy disks, healthcare organizations across 90 countries had their computers impacted intermittently once powered on after the 90th time.The message demanded an initial payment of $189, with…
Is Your Business Compliant with Data Sovereignty Requirements?
Data sovereignty regulations can be challenging for companies. One of the main difficulties is keeping track of where data is...
READ MORE >
Tracey Rice Named to DRJ Executive Council
ARNOLD, Mo. – Tracey Rice was recently appointed to the Disaster Recovery Journal Executive Council. Rice is the senior vice...
READ MORE >
Unlocking the Benefits of Business Continuity and Information Security Management
Exploring the Commonalities, Distinctions, and Synergies for Maximum Impact Business continuity management system (BCMS) and information security management system (ISMS)...
READ MORE >
Your Disaster Recovery Strategy Needs These Three Key Components Now
It’s a rare company that is completely confident in its disaster recovery (DR) plan. DR strategy is challenging for organizations...
READ MORE >