IT Management  >   Systems Operations  >   Security  >  

Data Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Data Protection, Data-security, Data Theft, Secure Data
DEFINITION: Ransomware is a type of malware used for data kidnapping, an exploit in which the attacker encrypts the victim's data and demands payment for the decryption key. A ransomware program can be installed from an e-mail attachment, an infected program, or a compromised or malicious Web site. Malware used for this purpose is sometimes called a cryptovirus, cryptotrojan or cryptoworm.Ransomware is not new.  … 
Definition continues below.
Data Security Reports
101 - 125 of 2283 Matches Previous Page  |  Next Page
Remote access your users will love
sponsored by Citrix
WHITE PAPER: Access this white paper to uncover the growing user challenges with remote access. Also, discover the key characteristics of a remote access solution strategy that gives users a remote experience they'll love while meeting IT's requirements for security and manageability.
Posted: 03 Aug 2015 | Published: 29 Mar 2013

Citrix

Delivering enterprise information securely on Android, Apple iOS and Microsoft Windows tablets and smartphones
sponsored by Citrix
WHITE PAPER: Access this white paper to get an in-depth look at the major mobile OS platforms, the security issues and features unique to each, and the measures IT needs to take to maintain control while encouraging productivity and mobility.
Posted: 03 Aug 2015 | Published: 30 Apr 2014

Citrix

Accel Takes MSP Automation to the Next Level
sponsored by Solarwinds N-able
CASE STUDY: This white paper details how one MSP was able to automate its processes and provide their clients with exceptional security and backup services. Read on to find out more about how this company was able to reduce the time of on-boarding tasks, increase operational efficiencies, and more.
Posted: 03 Aug 2015 | Published: 03 Aug 2015

Solarwinds N-able

Best practices to make BYOD simple and secure
sponsored by Citrix
WHITE PAPER: Access this white paper to explore the features and best practices of a complete BYOD strategy. Also, uncover a line of complete BYOD solutions that address all the key capabilities required to make BYOD simple, secure, and effective for any organization.
Posted: 03 Aug 2015 | Published: 30 Apr 2013

Citrix

Introduction to Citrix Workspace Suite
sponsored by Citrix
BROCHURE: Access this informative brochure to learn about a complete mobile workspace solution that allows IT to securely deliver all apps (Windows, web, SaaS, mobile), data, and services from any device, over any network.
Posted: 03 Aug 2015 | Published: 30 Apr 2014

Citrix

5 steps to introducing BYOD in your organization
sponsored by Citrix
WHITE PAPER: Access this informative white paper to explore technologies designed to optimize your BYOD deployment and learn five simple steps to plan and roll out a BYOD initiative in your organization.
Posted: 03 Aug 2015 | Published: 28 Feb 2013

Citrix

An Examination of Web App Security Process Management
sponsored by WhiteHat Security
WEBCAST: In this webcast, you'll learn the hard numbers about security vulnerabilities and how susceptible your organization is to being the next victim of an attack. View now to arm yourself with the knowledge to prepare for the inevitable attacks and reduce the likelihood of a data breach.
Posted: 30 Jul 2015 | Premiered: Jul 1, 2015

WhiteHat Security

3 Strategies to Manage Compliance Mandates
sponsored by Citrix
WHITE PAPER: This white paper focuses on 3 strategies to easily manage compliance. Follow along with these guidelines to prove to senior execs and board members that your company meets all of its requirements and can defensibly prove it.
Posted: 30 Jul 2015 | Published: 09 May 2014

Citrix

Cyber Attack Survival Checklist
sponsored by CrowdStrike
WHITE PAPER: This cyber-attack survival checklist will help you avoid common mistakes and eliminate deficiencies within your existing security measures.
Posted: 30 Jul 2015 | Published: 30 Jul 2015

CrowdStrike

Today's State of Mobile App Security
sponsored by IBM
WHITE PAPER: Mobile devices are at serious risk of being hacked with threat vectors constantly evolving. Organizations should consider mobile app assessments to determine if existing apps are exposed to risks that are unique to mobile environments. This white paper highlights the way to combat these threats.
Posted: 30 Jul 2015 | Published: 31 Dec 2014

IBM

FlexCast technology powers workforce mobility
sponsored by Citrix
WHITE PAPER: Check out this white paper to discover how FlexCast virtualization technology can help IT departments meet all of their virtualization goals, from enabling BYOD to transforming call centers.
Posted: 30 Jul 2015 | Published: 31 Dec 2013

Citrix

Empowering Information Security with Desktop Virtualization
sponsored by Citrix
WHITE PAPER: This white paper explores how desktop virtualization can help improve information security control, optimize overall application and desktop management, and spur initiatives that bring significant new opportunities for business growth.
Posted: 30 Jul 2015 | Published: 30 Jul 2015

Citrix

Virtual Server Protection: A Buyer's Checklist
sponsored by Commvault
WHITE PAPER: In this detailed checklist, explore the basic and advanced features you'll need in a virtual server protection solution to safeguard your corporate data.
Posted: 30 Jul 2015 | Published: 31 Dec 2014

Commvault

From BlackBerry to BYOD, CYOD or COPE
sponsored by Citrix
WHITE PAPER: Access this white paper to learn about the security, management, and application delivery features of Blackberry, Apple iOS and Google Android devices. Also, discover a comprehensive enterprise mobility management (EMM) and mobile device management (MDM) platform for BYOD initiatives.
Posted: 30 Jul 2015 | Published: 30 Apr 2015

Citrix

Responding to Unpopular HIPAA Disclosure Requirements
sponsored by Absolute
WHITE PAPER: In this research conducted by Gartner, discover the major findings of the HIPAA-HITECH debate between keeping patient information accessible or fully disclosed. Uncover recommendations on how to choose a side, lobby, and enter the public debate.
Posted: 29 Jul 2015 | Published: 27 Sep 2013

Absolute

10 Vital Questions for Evaluating Your Mobile Security Strategy
sponsored by Citrix
WHITE PAPER: Mobile security concerns continue to abound in the workplace (from passcode enforcement to device encryption). An end-to-end mobile security framework can allay these concerns. This white paper discusses the 10 "must-have" questions when thinking about mobile device management (MDM) at work.
Posted: 29 Jul 2015 | Published: 31 Dec 2013

Citrix

Taking Your Enterprise Mobile The Executive Checklist
sponsored by Citrix
WHITE PAPER: Access this white paper to explore the top mobile security concerns, including three top factors that contribute to enterprises' security concerns. Also, discover a checklist of key considerations of what to look for in a mobile strategy.
Posted: 29 Jul 2015 | Published: 31 May 2013

Citrix

Why You Need Backup and Disaster Recovery
sponsored by Solarwinds N-able
WHITE PAPER: This white paper makes a strong case for backup and disaster recovery and can help you to convince your clients (or your own company) that this is one of the best investments that a business can make.
Posted: 28 Jul 2015 | Published: 31 Jul 2014

Solarwinds N-able

Business-Critical Documents: Printing You Can Count On
sponsored by Nuance
WHITE PAPER: Improving your cost-effective printing is crucial. Whether printing from a desktop, mobile device or back office system, you can ensure critical and confidential documents are printed at the right place and time.
Posted: 28 Jul 2015 | Published: 27 Sep 2014

Nuance

Secure Your Printers and Eliminate Wasteful Costs
sponsored by Nuance
WEBCAST: This brief webcast explores how to reign in printing services in the organization to protect enterprise data. View now to discover how to stop data leaks before they happen and how to eliminate help desk tickets.
Posted: 27 Jul 2015 | Premiered: Feb 13, 2015

Nuance

Case Study: Meeting Compliance with Secure Document Capture and Printing
sponsored by Nuance
WHITE PAPER: Read this case study to discover how the VHA implemented secure document and print management solutions for improved security, compliance, and quality of care.
Posted: 27 Jul 2015 | Published: 31 Dec 2014

Nuance

Cyber Risk Report: Data Breaches and the Healthcare Industry
sponsored by SurfWatch Labs
WHITE PAPER: This white paper presents cybercrime statistics and trends that can help you stay secure despite the numerous threats facing the healthcare industry.
Posted: 24 Jul 2015 | Published: 24 Jul 2015

SurfWatch Labs

Enabling the Hybrid Cloud
sponsored by Zerto
WHITE PAPER: This white paper discusses how you can build a truly effective hybrid cloud by implementing application mobility and cross-platform protection.
Posted: 22 Jul 2015 | Published: 22 Jul 2015

Zerto

Bridging the BYOD security and UX gap
sponsored by HID
WHITE PAPER: This white paper explores the top security challenges of today and presents a holistic strategy to bridge the gap between mobile data security and user experience.
Posted: 21 Jul 2015 | Published: 24 Jun 2015

HID

9 Steps to a Secure Printer
sponsored by Nuance
WHITE PAPER: This white paper discusses just how much danger your printer poses to your organization and gives you nine tips for mitigating that danger.
Posted: 21 Jul 2015 | Published: 31 May 2015

Nuance
101 - 125 of 2283 Matches Previous Page    3 4 5 6 7 8    Next Page
 
DATA SECURITY DEFINITION (continued): …  A paper entitled "Cryptovirology: Extortion-Based Security Threats and Countermeasures," written by security experts at Columbia University and IBM, clearly outlined the concept back in 1996. In the past, though, data kidnappers targeted businesses rather than individuals. In March 2006, ransomware known as Crypzip or Zippo circulated to private users on the Internet. Recipients of the Trojan horse program also received an e-mail ransom note demanding $300, to be paid by electronic transfer, for the key required to unlock all their files.A newer type of ransomware uses a Trojan to encrypt files … 
Data Security definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement