IT Management  >   Systems Operations  >   Security  >  

Data Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Data Protection, Data-security, Data Theft, Secure Data
DEFINITION: Ransomware is a type of malware used for data kidnapping, an exploit in which the attacker encrypts the victim's data and demands payment for the decryption key. A ransomware program can be installed from an e-mail attachment, an infected program, or a compromised or malicious Web site. Malware used for this purpose is sometimes called a cryptovirus, cryptotrojan or cryptoworm.Ransomware is not new.  … 
Definition continues below.
Data Security White Papers (View All Report Types)
76 - 100 of 1277 Matches Previous Page  |  Next Page
Risk Report: Hacktivism and Encryption at the Forefront of Cyber-Attacks
sponsored by SurfWatch Labs
WHITE PAPER: This white paper illustrates the latest trends in the cyber risk landscape showing how unencrypted computers and other devices plague IT. Continue reading to learn why you can't afford to ignore data and device encryption.
Posted: 12 Jan 2016 | Published: 31 Aug 2015

SurfWatch Labs

Is Your Network Safe? Identifying Most Overlooked Endpoint of Them All
sponsored by HP Limited
WHITE PAPER: In this white paper, you will highlight the most critical vulnerabilities that network-connected printers pose. Read on now to enforce user authentication, admin passwords, and printer feature restriction for your network-connected endpoints.
Posted: 12 Jan 2016 | Published: 31 Jan 2015

HP Limited

The Insecurity of Network-Connected Printers: Address Hardcopy Document Security
sponsored by HP Limited
WHITE PAPER: In this exclusive report, you will examine the risks dredged up by insecure printers and other peripheral devices in your business, as well as discover several best-in-class action strategies and practices for addressing end-point device and hardcopy document security.
Posted: 12 Jan 2016 | Published: 31 Oct 2015

HP Limited

Data Protection with Zero Data Loss Recovery Appliance
sponsored by Oracle Corporation
WHITE PAPER: This brief white paper highlights an Oracle data loss recovery appliance that delivers data protection-as-a-service and accelerates database performance. Read on to see how this self-contained solution can enable your enterprise to recover quickly and benefit from less downtime and data loss.
Posted: 11 Jan 2016 | Published: 31 Dec 2015

Oracle Corporation

Untapped Data Backup & Protection Processess
sponsored by Datto, Inc.
WHITE PAPER: This essential e-guide discusses the pros and cons of mounting backups versus recovering from backups and highlights untapped data protection processes such as backup, DR, and archiving. Access now to gain expert insight on choosing the right data protection solutions for your enterprise.
Posted: 11 Jan 2016 | Published: 11 Jan 2016

Datto, Inc.

SSL/TLS Visibility: Determining Your Network Security Blind Spot Cost
sponsored by Blue Coat Systems
WHITE PAPER: This white paper will assist you in calculating the cost of leaving the SSL/TLS network security blind spot open to hackers and presents strategies to mitigate risks.
Posted: 08 Jan 2016 | Published: 16 Dec 2015

Blue Coat Systems

Better Data Protection With Built-In Capabilities
sponsored by NetApp
WHITE PAPER: This white paper discusses built-in, integrated data protection solutions that combine backup, snapshots, and replication. Read on to learn how you can optimize your data protection and data management lifecycles with the right solution for your enterprise's needs.
Posted: 08 Jan 2016 | Published: 31 Jan 2015

NetApp

A Guide to Advanced Threat Detection for Sensitive Enterprise IP
sponsored by Interset Software Inc.
WHITE PAPER: In this white paper, you will explore the unique challenges of protecting critical enterprise data and examine a holistic approach to protecting your sensitive data that utilizes advanced behavioral analytics to safeguard your high-value IP.
Posted: 08 Jan 2016 | Published: 31 Dec 2015

Interset Software Inc.

Don't Get Lost in the Cloud: 10 Tips for Protecting Data in the Cloud
sponsored by Blue Coat Systems
WHITE PAPER: As organizations embrace more as-a service offerings, data visibility in the cloud becomes foggy. Relying on providers for compliance and protection simply isn't enough, but you shouldn't write off the cloud just yet. This white paper offers 10 tips for protecting data in the cloud to avoid breaches, loss, or theft.
Posted: 07 Jan 2016 | Published: 11 Nov 2015

Blue Coat Systems

Real-World Data Breach Protection Techniques
sponsored by Intel
WHITE PAPER: This white paper examines the importance of data loss prevention (DLP) in today's advanced cybercrime environment. Read on to learn how you can implement effective DLP and keep your data out of hackers' hands.
Posted: 07 Jan 2016 | Published: 31 Dec 2015

Intel

Stop Attacks Hiding Under the Cover of SSL Encryption
sponsored by Blue Coat Systems
WHITE PAPER: This brief infographic lays out sobering statistics about encrypted traffic attacks and describes how encrypted traffic management can help mitigate these risks.
Posted: 07 Jan 2016 | Published: 09 Dec 2013

Blue Coat Systems

Gaining Awareness and Combatting Cyber Threats Without Breaking the Bank
sponsored by SurfWatch Labs
WHITE PAPER: This paper examines credit union security and gives tips on keeping cybercrime out of your organization. Read on for essential insight on building strong security on a small budget.
Posted: 07 Jan 2016 | Published: 31 Dec 2015

SurfWatch Labs

Flipping the Script: Law Firms Hunted by Cybercriminals
sponsored by SurfWatch Labs
WHITE PAPER: This resource examines the cyber-threats facing law firms, explaining why they are attractive and easy targets for cybercriminals. Access it to discover just how much danger your firm is in and how you can stay safe.
Posted: 07 Jan 2016 | Published: 07 Jan 2016

SurfWatch Labs

The Hidden Data Economy
sponsored by Intel
WHITE PAPER: In this white paper, you'll discover just how widespread the black market for private data is. Read on to see how this illegitimate economy operates and how you can keep your sensitive data out of it.
Posted: 06 Jan 2016 | Published: 31 Dec 2015

Intel

Special Report: The Risks of Shadow Data
sponsored by Elastica
WHITE PAPER: Based on the analysis of over 63 million documents, this report on shadow data provides valuable insights into cloud application usage to help organizations unlock the full business potential of cloud apps while staying secure and compliant.
Posted: 06 Jan 2016 | Published: 06 Jan 2016

Elastica

Top 10 Reasons to Transform Your Data Protection Strategy
sponsored by NetApp
WHITE PAPER: This essential white paper reveals 10 critical reasons to transform your data protection strategy to a modern solution. Read on to see how you can transform your backup into a strategic asset with tighter integration and greater efficiency.
Posted: 06 Jan 2016 | Published: 06 Jan 2016

NetApp

Hospitality and Cybercrime: How to Safeguard Sensitive Information
sponsored by SurfWatch Labs
WHITE PAPER: This white paper explores the many cyber-risks faced by the hospitality sector. Access it and discover just how much your business is at risk – and what you can do about it.
Posted: 06 Jan 2016 | Published: 06 Jan 2016

SurfWatch Labs

Plan Ahead and Protect Your Data
sponsored by NetApp
WHITE PAPER: This white paper examines some of the key challenges enterprises are facing as they try to protect their data, and the solutions that can help them address these challenges in a cost-effective way. Read on to learn more.
Posted: 05 Jan 2016 | Published: 05 Jan 2016

NetApp

Top 5 Questions Answered on How to Best Protect Your Data in the Cloud
sponsored by Blue Coat Systems
WHITE PAPER: Discover the top 5 questions (and answers) you need to consider when crafting your cloud security strategy. The sad truth is there is no silver bullet to keep your data safe, but there are simple steps to keep hackers out. View now to find out what they are.
Posted: 05 Jan 2016 | Published: 18 Nov 2015

Blue Coat Systems

Ten Smart Things to Know About Storage
sponsored by Icomm Technologies
WHITE PAPER: This white paper uncovers how the field of storage is developing and how new storage innovations such as cloud and virtualization can affect your business. Read on to learn how one vendor can provide your enterprise with a unified storage solution with the capabilities to manage some of the not so glamorous storage trends in today's environment.
Posted: 05 Jan 2016 | Published: 31 Dec 2012

Icomm Technologies

Lightning Strikes Twice: How to Quickly Recover After a Disaster
sponsored by Datto, Inc.
WHITE PAPER: This white paper discusses one company's decision to invest in a cloud backup service that provides them with total data protection everywhere their data lives. Access now to learn how this comprehensive backup, recovery, and business continuity solution can allow your enterprise to continue to work through a disaster even if your servers are down.
Posted: 23 Dec 2015 | Published: 30 Jul 2015

Datto, Inc.

Data Loss Nightmares of a Salesforce.com Admin
sponsored by Datto, Inc.
WHITE PAPER: This white paper discusses 5 common nightmares every organization has regarding their data protection and the threat of a data loss. Read on to discover how to manage your data with an automatic cloud-to-cloud backup solution that will ensure your data is secure.
Posted: 23 Dec 2015 | Published: 23 Dec 2015

Datto, Inc.

A Secure Path to the Cloud
sponsored by Oracle Corporation
WHITE PAPER: In this white paper, learn how one cloud infrastructure provider has built cybersecurity into the hardware to go beyond basic network and data defenses to protect your organization's sensitive assets.
Posted: 22 Dec 2015 | Published: 09 Dec 2015

Oracle Corporation

Case Study: How One MSP Kept Their Client's Business Operations Alive Through Flood and Fire
sponsored by Datto, Inc.
WHITE PAPER: This case study focuses on one company's decision to implement cloud-based backup so that they could remain productive during any possible disaster. Access now to see how cloud backup can improve your business continuity plan and allow your enterprise to minimize and even eliminate downtime.
Posted: 22 Dec 2015 | Published: 18 Nov 2015

Datto, Inc.

The Complete Guide to Office 365 Security
sponsored by Datto, Inc.
WHITE PAPER: This document gives an in-depth look at the security features that Microsoft has built into Office 365. Discover how stringent Office 365's security practices are and learn exactly what's being done to protect your valuable data.
Posted: 22 Dec 2015 | Published: 22 Dec 2015

Datto, Inc.
76 - 100 of 1277 Matches Previous Page    2 3 4 5 6 7    Next Page
 
DATA SECURITY DEFINITION (continued): …  A paper entitled "Cryptovirology: Extortion-Based Security Threats and Countermeasures," written by security experts at Columbia University and IBM, clearly outlined the concept back in 1996. In the past, though, data kidnappers targeted businesses rather than individuals. In March 2006, ransomware known as Crypzip or Zippo circulated to private users on the Internet. Recipients of the Trojan horse program also received an e-mail ransom note demanding $300, to be paid by electronic transfer, for the key required to unlock all their files.A newer type of ransomware uses a Trojan to encrypt files … 
Data Security definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement