IT Management  >   Systems Operations  >   Security  >  

Data Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Data Protection, Data-security, Data Theft, Secure Data
DEFINITION: Ransomware is a type of malware used for data kidnapping, an exploit in which the attacker encrypts the victim's data and demands payment for the decryption key. A ransomware program can be installed from an e-mail attachment, an infected program, or a compromised or malicious Web site. Malware used for this purpose is sometimes called a cryptovirus, cryptotrojan or cryptoworm.Ransomware is not new.  … 
Definition continues below.
Data Security Reports
1 - 25 of 2392 Matches Previous Page  |  Next Page
'Tis the Season to Offer an Outstanding Customer Experience
sponsored by CyberSource
WHITE PAPER: In this white paper, learn 6 ways you can ensure a superior online shopping experience for you customers and reap rewards like increased loyalty and sales. These 6 tips include: design a seamless browse-and-pay experience, keep payment data safe and secure, and more.
Posted: 25 Nov 2015 | Published: 25 Nov 2015


Best Practices to Protecting AWS Cloud Resources
sponsored by
EGUIDE: Access this exclusive e-guide from the experts at to explore solutions that effectively secure apps and data in the AWS cloud. You'll also examine three network security measures that enterprises should follow when designing an AWS environment.
Posted: 25 Nov 2015 | Published: 25 Nov 2015

Bring Security and Efficiency to Healthcare with Cloud Communications
sponsored by 8x8, Inc.
WHITE PAPER: This white paper explains how cloud computing can help you more efficiently share patient information without putting any of that sensitive data at risk.
Posted: 24 Nov 2015 | Published: 24 Nov 2015

8x8, Inc.

Defining the ROI: Disk-Based vs. Tape Archiving
sponsored by Imation Corp.
WHITE PAPER: This white paper provides a comprehensive benefit and cost comparison to help organizations define the ROI of their archiving investments, whether they are disk-based or tape. Access now to see how disk archiving can provide your enterprise with performance levels that can provide more flexibility to minimize your architectural complexity and cost.
Posted: 24 Nov 2015 | Published: 08 Apr 2014

Imation Corp.

Best Practices for Securing Workloads in Amazon Web Services
sponsored by
WHITE PAPER: Access this informative resource to explore best practices for securely deploying enterprise workloads in AWS. You'll also learn how these tips can apply to securing workloads in other IaaS strategies.
Posted: 24 Nov 2015 | Published: 15 Apr 2015

Keep Mobile Apps Safe With These Security Best Practices
sponsored by WhiteCryption
EGUIDE: Access this expert guide for advice on solving your mobile security challenges through better mobile app protection.
Posted: 24 Nov 2015 | Published: 24 Nov 2015


Full, Incremental or Differential: How to Choose the Correct Backup Type
sponsored by DLT & Veritas
EGUIDE: This expert eGuide outlines the difference between incremental and differential backups. Read on to learn which method is best for protecting your data, as well as a new method to improve information governance.
Posted: 24 Nov 2015 | Published: 24 Nov 2015

DLT & Veritas

Data Backup and Recovery Technology Tutorials
sponsored by DLT & Veritas
EGUIDE: Access this expert eGuide for informative tutorials about the latest in backup and recovery. Read on to learn about the differences between backup and archiving, as well as the benefits of using tape vs. disk for each.
Posted: 24 Nov 2015 | Published: 24 Nov 2015

DLT & Veritas

How to Protect Your Healthcare Communications in a World of Security and Compliance Threats
sponsored by 8x8, Inc.
WHITE PAPER: This white paper discusses how you can maintain security and compliance, especially in an area of healthcare IT that's frequently overlooked: Communications.
Posted: 23 Nov 2015 | Published: 23 Nov 2015

8x8, Inc.

Cloud Your Way: Deployments Without Compromise
sponsored by Unit4
WHITE PAPER: This white paper focuses on one vendor's flexible cloud deployment solution and offers five advantages it offers over competitor cloud solutions. Access now to learn how this solution reduces management and maintenance costs with a shared application infrastructure and lowers risk by keeping your data safe in its own database.
Posted: 23 Nov 2015 | Published: 23 Nov 2015


Copy Data Management: In-Place vs. Rip and Replace
sponsored by Catalogic Software
WHITE PAPER: This white paper compares two common copy data management (CDM) technologies, in-place CDM and rip-and-replace CDM, and discusses how in-place solutions are quickly becoming the go-to solution for most organizations. Read on to see how in-place CDM solutions can provide your enterprise with a non-disruptive path to copy data management.
Posted: 23 Nov 2015 | Published: 23 Nov 2015

Catalogic Software

Case Study: Earthquake Prompts Manufacturing Company to Protect Its Business
sponsored by Riverbed Technology, Inc.
CASE STUDY: This case study focuses on how one company improved their disaster recovery capabilities by deploying a converged infrastructure that replaced their physical servers with virtual machines. Access now to learn how this infrastructure can enable your enterprise to protect and backup data in a secure environment and lower your data center costs.
Posted: 23 Nov 2015 | Published: 30 Sep 2014

Riverbed Technology, Inc.

Orchestrating Security in the Cloud
sponsored by
ANALYST REPORT: Access this report to uncover survey results about organizations use of cloud computing for their workloads and how they are keeping them secure. You'll learn the current state of cloud computing, top cloud security concerns, how to build better cloud defenses, and more.
Posted: 23 Nov 2015 | Published: 30 Sep 2015

Healthcare Data Access Compliance
sponsored by
RESEARCH CONTENT: Concurrent logins, manual logoffs, password sharing and the lack of unique logins are putting patient records at risk, according to this research paper by IS Decisions.
Posted: 23 Nov 2015 | Published: 23 Nov 2015

Cybersecurity Strategy Needs to be More Dynamic
sponsored by Unisys
EGUIDE: This expert e-guide explores app vulnerabilities and security strategy shortcomings and how you can fill in the gaps and adjust your approach to adapt to the changing threat landscape. View now to learn why a walled network will enable more data breaches to succeed and how to take a more holistic view of cybersecurity.
Posted: 20 Nov 2015 | Published: 18 Nov 2015


FAQs: Why Banks Need a Dedicated Mobile Banking Security System
sponsored by HID
WHITE PAPER: This white paper addresses the mobile security FAQs to help banking organizations evaluate current strategy options. View now to learn the 4 goals banks need to accomplish and how to make customers feel secure when using online banking offerings.
Posted: 20 Nov 2015 | Published: 11 Nov 2015


Traditional Security is Dead. Long Live Micro-Segmentation.
sponsored by Unisys
WHITE PAPER: This white paper outlines micro-segmentation's power to tip the balance of power back to IT and away from cybercriminals. Discover how to easily divide your physical networks into hundreds or thousands of logical micro networks, (analogous safe deposit boxes, rather than every network in a vulnerable vault).
Posted: 19 Nov 2015 | Published: 11 Nov 2015


Cybersecurity Experts Brittle Security Systems Need Overhaul
sponsored by Unisys
EGUIDE: In this expert e-guide, learn why your security strategy will continue to fail if you do not prioritize the continuous implementation and upgrading of sophisticated security controls and the ongoing education of users and CXOs.
Posted: 19 Nov 2015 | Published: 04 Nov 2015


The Importance of E-Commerce and the Advantages of Moving to the Cloud
sponsored by Interoute
WHITE PAPER: Access this white paper to discover the challenges of e-commerce and how cloud hosting provides a number of benefits for e-commerce solutions. You'll also learn how an IaaS cloud can provide an e-commerce platform that responds to these challenges.
Posted: 19 Nov 2015 | Published: 30 Oct 2015


Case Study: Video Surveillance Firm Drives International Growth with OEM Partnership
sponsored by Dell, Inc.
CASE STUDY: This case study showcases one video surveillance company's partnership with an OEM solution that provided secure, customizable IT hardware. Read on to see how this OEM solution can provide you with high-performance hardware that can allow you to offer reliable service to your customers and continue to expand your business.
Posted: 19 Nov 2015 | Published: 30 Jun 2015

Dell, Inc.

How Do You Secure Financial Transaction Data Across Multiple Retail Locations?
sponsored by Unisys
CASE STUDY: In this white paper, learn how one major Brazilian supermarket chain closed network and access security vulnerabilities to become PCI DSS compliant. Read on and discover the benefits of micro-segmentation.
Posted: 18 Nov 2015 | Published: 30 Sep 2015


Lenovo and Pivot3 Launch a Global Hyper-Converged Infrastructure Solution
sponsored by Pivot3
PRODUCT OVERVIEW: Pivot3 breaks the long-standing trade-off between available storage capacity and data protection, reducing both cost and complexity in the data center. Download for more details.
Posted: 18 Nov 2015 | Published: 18 Nov 2015


Cloud and Tape Solutions: Better Together
sponsored by FujiFilm Dternity
WHITE PAPER: This white paper discusses how a hybrid cloud and tape solution can work together to provide a sustainable storage infrastructure. Access now to see how this tape-powered NAS solution can allow your enterprise to store files and objects with the flexibility of cloud and maintain cost-effective second and third copies by leveraging tape economics.
Posted: 18 Nov 2015 | Published: 31 Mar 2015

FujiFilm Dternity

Special Report: Healthcare Security in 2015
sponsored by Raytheon|Websense
WHITE PAPER: This report examines the issues and challenges surrounding IT security in the healthcare industry and gives advice on overcoming them.
Posted: 17 Nov 2015 | Published: 22 Sep 2015


Security in a Dangerous Time: Network Security's Top Fears in 2015
sponsored by Fortinet, Inc.
WHITE PAPER: This white paper shares the top 5 security priorities that concerned network security professionals over the last year.
Posted: 17 Nov 2015 | Published: 08 Apr 2015

Fortinet, Inc.
1 - 25 of 2392 Matches Previous Page    1 2 3 4    Next Page
DATA SECURITY DEFINITION (continued): …  A paper entitled "Cryptovirology: Extortion-Based Security Threats and Countermeasures," written by security experts at Columbia University and IBM, clearly outlined the concept back in 1996. In the past, though, data kidnappers targeted businesses rather than individuals. In March 2006, ransomware known as Crypzip or Zippo circulated to private users on the Internet. Recipients of the Trojan horse program also received an e-mail ransom note demanding $300, to be paid by electronic transfer, for the key required to unlock all their files.A newer type of ransomware uses a Trojan to encrypt files … 
Data Security definition sponsored by, powered by an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement