IT Management  >   Systems Operations  >   Security  >  

Data Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Data Protection, Data-security, Data Theft, Secure Data
DEFINITION: Ransomware is a type of malware used for data kidnapping, an exploit in which the attacker encrypts the victim's data and demands payment for the decryption key. A ransomware program can be installed from an e-mail attachment, an infected program, or a compromised or malicious Web site. Malware used for this purpose is sometimes called a cryptovirus, cryptotrojan or cryptoworm.Ransomware is not new.  … 
Definition continues below.
Data Security Reports
126 - 150 of 2407 Matches Previous Page  |  Next Page
IT Project: Storage Architecture ASEAN
sponsored by ComputerWeekly.com
EGUIDE: When it comes to storage, is cost the critical factor for CIOs in ASEAN? This guide explores the factors that are influencing the adoption of storage technologies in ASEAN and the trends that you can expect to see more of in the next 2-3 years.
Posted: 27 Sep 2016 | Published: 28 Sep 2016

ComputerWeekly.com

Safeguarding Vital Data Is a Battle You Can Win
sponsored by Intel Security
WHITE PAPER: In this resource, uncover what it means to develop data management and protection policies that reach from the core of the business out to mobile devices, the cloud and beyond. Also, learn how to be ready for whatever security challenges the world sends your way.
Posted: 24 Sep 2016 | Published: 24 Sep 2016

Intel Security

Policing cyber crime
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Security series considers the duties of the police in the UK and asks whether these roles remain realistic and achievable in cyber space
Posted: 23 Sep 2016 | Published: 23 Sep 2016

ComputerWeekly.com

Case Study: Metro Diagnostic Imaging Adds Cloud to Mobile Van
sponsored by Ambra
CASE STUDY: Access this case study to learn how moving PACS to the cloud allowed Metro Diagnostic Imaging more flexibility and productivity for the mobile imaging service provider, ensuring imaging data is at the user's fingertips.
Posted: 22 Sep 2016 | Published: 22 Sep 2016

Ambra

Securing Office 365 Is Easier Than You Think
sponsored by Palo Alto Networks
WHITE PAPER: SaaS security concerns can no longer be ignored: Discover how to safely enable Office 365. Read on to address O365-specific security concerns, including details on how to secure O365 from malware insertion and data loss, gain visibility into SaaS usage, and more.
Posted: 22 Sep 2016 | Published: 22 Sep 2016

Palo Alto Networks

Case Study: Jefferson Radiology Implements Cloud VNA
sponsored by Ambra
CASE STUDY: See how Jefferson Radiology revolutionized imaging workflows by replacing their legacy image exchange vendor and migrating to a new cloud-enabled PACS. Learn about best-in-class image management that will automate workflows and provide seamless cloud access to records.
Posted: 22 Sep 2016 | Published: 22 Sep 2016

Ambra

Veritas NetBackup Appliances: Reducing Cost and Complexity
sponsored by Veritas
WHITE PAPER: This brief white paper highlights a fully integrated appliance for backup and recovery with highly scalable storage appliances that lowers costs and simplifies operations. Discover 7 ways in which appliances can enhance your backup infrastructure.
Posted: 21 Sep 2016 | Published: 21 Sep 2016

Veritas

Protect Yourself from Antivirus: Why Traditional AV Doesn't Offer Meaningful Security Value
sponsored by Palo Alto Networks
WHITE PAPER: Traditional antivirus (AV) is no longer the solution to preventing endpoint breaches—it's the problem. Access this resource to learn why traditional AV no longer offers meaningful security value for your organization, and see how to get started protecting your endpoints without AV.
Posted: 21 Sep 2016 | Published: 21 Sep 2016

Palo Alto Networks

Case Study: Disc Comfort Fuses Image Management with athenahealth
sponsored by Ambra
CASE STUDY: Wherein lays the path to seamless, secure medical image access? Learn how to improve patient care with a medical imaging cloud that will reduce time spent loading and viewing patient CDs. Additionally, discover how connecting image management to your EHR will transform patient care.
Posted: 21 Sep 2016 | Published: 21 Sep 2016

Ambra

Case Study: CareWell Streamlines Patient Journey & Reduces Risk
sponsored by Ambra
CASE STUDY: Discover how CareWell Urgent Care streamlined image management, reduced risk of data exposure, and eliminated barriers to siloed information across the network by cloud-enabling PACS.
Posted: 21 Sep 2016 | Published: 21 Sep 2016

Ambra

The New World of Unified Image Management in Healthcare
sponsored by Ambra
EBOOK: In order to truly embrace a collaborative care environment, the future of interoperable medical imaging lies in the cloud. Download this e-book to discover how implementing cloud-based PACS will enhance digital imaging workflows, boost storage capabilities, grow your network, and improve patient care.
Posted: 20 Sep 2016 | Published: 20 Sep 2016

Ambra

Computer Weekly – Digital giving – transforming Save the Children with technology
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we talk to global charity Save the Children to find out how technology is helping to transform its work. We go behind the scenes at the UK's most secretive court as it discusses bulk data surveillance. And we analyse the often contradictory experiences of firms implementing SAP's Hana platform. Read the issue now.
Posted: 16 Sep 2016 | Published: 20 Sep 2016

ComputerWeekly.com

5 Steps to Raising Ransomware Resistance
sponsored by SearchSecurity.com
EBOOK: This TechGuide explores the nature of the threat and the latest ransomware trends. It outlines several steps information security pros should take in order to heighten their organization's resistance and prevent ransomware attacks.
Posted: 16 Sep 2016 | Published: 16 Sep 2016

SearchSecurity.com

Healthcare & Cloud: How Does The Cloud Apply To Imaging Today?
sponsored by Ambra
EBOOK: Discover how to properly prevent the catastrophic loss of images, and optimize healthcare systems storage capacity, by deploying cloud-based archiving for the PACS infrastructure. Read on to create a highly agile environment for sharing and receiving medical data, and secure all expanding images on-demand.
Posted: 16 Sep 2016 | Published: 16 Sep 2016

Ambra

Achieving Maximum Backup Granularity
sponsored by Veeam Software
WEBCAST: Discover a data backup and replication solution that ensures your enterprise can recover what you need, when you need it. Watch and learn how to easily browse business-critical applications, avoid data loss with item-level restores, use advanced search options to find what you need to restore, and more.
Posted: 15 Sep 2016 | Premiered: Sep 9, 2015

Veeam Software

Grow Your Business with NetApp and Veeam
sponsored by Veeam Software
WHITE PAPER: Discover how NetApp and Veeam backup and recovery products can provide your enterprise with an efficient disaster recovery and availability solution. By combining these products, your enterprise can benefit from accelerated enterprise application performance, easy data protection and recovery, a cloud-ready data center, and more.
Posted: 14 Sep 2016 | Published: 30 Apr 2016

Veeam Software

Data Archiving Solutions - Archive Data with Industry Leading Systems
sponsored by Globanet Veritas
RESOURCE CENTER: All types of companies rely on their data and need archiving solutions to protect it. This resource center highlights a service provider that deploys industry-leading archive systems and solutions for organizations worldwide. Learn about this provider's professional on-site and remote support that can meet your organization's every need.
Posted: 28 Sep 2016 | Published: 14 Jun 2016

Globanet Veritas

What to Look for in Web Fraud Detection Systems
sponsored by SearchSecurity.com
EBOOK: In this TechTarget Buyer's Guide readers will learn the key features of a Web fraud detection product and how to choose the best product for their company.
Posted: 28 Sep 2016 | Published: 23 Mar 2016

SearchSecurity.com

Get the Most Out of Your SIEM System
sponsored by Trustwave
EGUIDE: SIEM platforms remove a huge burden from your security team and allow them to focus on other analysis-related tasks. However, SIEM systems are not infallible. Discover how to better employ your SIEM system to produce the most accurate event analysis you can hope for.
Posted: 27 Sep 2016 | Published: 23 Sep 2016

Trustwave

Securing Data Access Within the Healthcare Industry
sponsored by VASCO Data Security International
WHITE PAPER: Access this white paper to better understand the changing role of technology within the healthcare sector and best practices to integrate security without compromising the patient experience.
Posted: 23 Sep 2016 | Published: 31 Aug 2016

VASCO Data Security International

7 Critical Components for Cybersecurity Readiness
sponsored by Dimension Data
EGUIDE: This guide shows you seven elements of cyber security readiness critical for every organization. Expert Peter Sullivan outlines the most important components that your organization needs for a high degree of situational awareness into your network operations and utilization.
Posted: 22 Sep 2016 | Published: 20 Sep 2016

Dimension Data

How Strong Is Your Electronic Healthcare Records Storage Strategy?
sponsored by Kaminario
WHITE PAPER: In this brief paper, you will access a checklist for evaluating how well your healthcare data storage strategy holds up to these rising EHR data volumes. Read on to discover if your data storage delivers predictability as EHR data grows, provides resilient data protection, and more.
Posted: 21 Sep 2016 | Published: 21 Sep 2016

Kaminario

Preventing Ransomware Threats to Health Data in 10 Steps
sponsored by Cisco
WHITE PAPER: Health data has become some of the most sought-after personal data on the black market, making healthcare professionals and hospital systems prime targets for cybercrime – particularly ransomware attacks. This e-guide will provide you with 10 steps to avoid ransomware attacks on your health systems.
Posted: 16 Sep 2016 | Published: 14 Sep 2016

Cisco

How Healthcare Organizations are Tackling IoT Device Management
sponsored by Cisco
EGUIDE: Connected medical devices are becoming more widespread in healthcare, but security and management options are limited for IT teams. This e-guide will teach you how to devise a plan to secure each device from surface attacks and cyberthreats. Plus, see how several vendors are tackling this problem and offering tools to keep patient data safe.
Posted: 16 Sep 2016 | Published: 14 Sep 2016

Cisco

Squash Large Business Email Security Challenges
sponsored by Intermedia
EGUIDE: If you're a large enterprise, your security needs are unique. So don't take advice from a small organization, and learn how to accommodate the challenges specific to your size. This exclusive e-guide explores some Exchange security challenges and considerations that large enterprises face on a daily basis.
Posted: 15 Sep 2016 | Published: 13 Sep 2016

Intermedia
126 - 150 of 2407 Matches Previous Page    4 5 6 7 8 9    Next Page
 
DATA SECURITY DEFINITION (continued): …  A paper entitled "Cryptovirology: Extortion-Based Security Threats and Countermeasures," written by security experts at Columbia University and IBM, clearly outlined the concept back in 1996. In the past, though, data kidnappers targeted businesses rather than individuals. In March 2006, ransomware known as Crypzip or Zippo circulated to private users on the Internet. Recipients of the Trojan horse program also received an e-mail ransom note demanding $300, to be paid by electronic transfer, for the key required to unlock all their files.A newer type of ransomware uses a Trojan to encrypt files … 
Data Security definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement