IT Management  >   Systems Operations  >   Security  >  

Data Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Data Protection, Data-security, Data Theft, Secure Data
DEFINITION: Ransomware is a type of malware used for data kidnapping, an exploit in which the attacker encrypts the victim's data and demands payment for the decryption key. A ransomware program can be installed from an e-mail attachment, an infected program, or a compromised or malicious Web site. Malware used for this purpose is sometimes called a cryptovirus, cryptotrojan or cryptoworm.Ransomware is not new.  … 
Definition continues below.
Data Security Reports
1 - 25 of 2412 Matches Previous Page  |  Next Page
Protecting Your Business in the Digital Transformation Journey
sponsored by Hewlett-Packard Enterprise
WHITE PAPER: As digital transformation shifts the risk landscape, IT security must change with it. In this white paper, discover the nature of this shit, as well as the role mobile devices play in modern security networks, how a BI program can help you build a comprehensive security program, successful strategies used by other mid-market companies, and more.
Posted: 17 Jan 2017 | Published: 29 Feb 2016

Hewlett-Packard Enterprise

Prevention Is Not Always Foolproof: Enter Unified Cloud Backup and Recovery
sponsored by QuorumLabs Inc.
RESOURCE: Download this resource to take a brief but informative look at how unified data backup/DR provides you with the ability to execute instant recovery, offsite replication, archiving, advanced deduplication, and more. Learn how to configure your DR in minutes with a robust DRaaS cloud.
Posted: 11 Jan 2017 | Published: 11 Jan 2017

QuorumLabs Inc.

Keeping the Keys to Your Cloud Future Secure
sponsored by Entrust, Inc.
RESOURCE: Discover the key challenge and key enabler of digital business safely migrating to the cloud and ensuring the right people have the right keys, privileges and certificates, while keeping them out of the hands of hackers.
Posted: 11 Jan 2017 | Published: 15 Sep 2016

Entrust, Inc.

The 5 Rings of Data Integration Hell
sponsored by Globalscape
WHITE PAPER: In this guide, discover the 5 "rings of hell" that make meeting data integration requirements difficult. In addition learn about the various scenarios which can cause data integration challenges, various methods for data migration worth considering, and more.
Posted: 11 Jan 2017 | Published: 31 Dec 2016

Globalscape

How The US Navy Helped Transform Today's BDR Market
sponsored by QuorumLabs Inc.
WHITE PAPER: This white paper explains how the US Navy helped transform today's BDR market. Discover an agnostic solution that fits into any environment to provide backup and disaster recovery capabilities that now offers the fastest recovery in the market, as well as the easiest backups.
Posted: 10 Jan 2017 | Published: 10 Jan 2017

QuorumLabs Inc.

The State of Disaster Recovery & Backup: An Exclusive Report
sponsored by QuorumLabs Inc.
WHITE PAPER: Changes in the world of DR are bringing to light old backup frustrations. Download this essential State of DR report now to find out if your company is behind the curve or leading the pack in DR with cloud-based backup.
Posted: 10 Jan 2017 | Published: 31 Dec 2016

QuorumLabs Inc.

Protecting your organisation from itself
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This report from QuinetiQ offers advice on mitigating the risks of cyber breaches from inside your organisation.
Posted: 06 Jan 2017 | Published: 06 Jan 2017

ComputerWeekly.com

Security for the Future-Ready Workforce
sponsored by Dell, Inc. & Intel®
WHITE PAPER: To both empower the workforce and protect the enterprise, organizations must choose the right technologies and match users to the right devices. Learn how to cover the needs of 5 future-ready worker categories, while keeping your data safe.
Posted: 05 Jan 2017 | Published: 05 Jan 2017

Dell, Inc. & Intel®

Survey Findings: Data Security
sponsored by Dell, Inc. & Intel®
WHITE PAPER: This data security report illuminates the data security concerns held by businesses. Learn how to obtain the business support needed to integrate data security, while mitigating the cloud and mobile risks that plague IT.
Posted: 04 Jan 2017 | Published: 04 Jan 2017

Dell, Inc. & Intel®

Reviewing the Current State of Hyperconvergence and Benefits of Virtual SAN Deployments
sponsored by VMware
ANALYST REPORT: Discover the top 2016 trends driving organizations to deploy hyperconverged infrastructure. Read on to also see illustrated the benefits achieved from HCI built on virtual SAN for 3rd Platform technologies.
Posted: 27 Dec 2016 | Published: 31 Jul 2016

VMware

How to Create a Holistic Strategy for Office 365 Data Protection
sponsored by AvePoint, Inc.
WHITE PAPER: Learn how to make security part of your regular workflow with tools that help integrate compliance into everyday business use of Office 365. Discover how to minimize the risk of a breach and ensure uninterrupted user workflow by baking in compliance tools from the beginning.
Posted: 23 Dec 2016 | Published: 30 Nov 2016

AvePoint, Inc.

Best Practices for Enterprise Security
sponsored by Citrix
WHITE PAPER: The modern enterprise workforce calls for deep, comprehensive security to keep data protected no matter how people work. Discover best practices for securing your modern workforce, which include network security, access management, app security, and monitoring and response.
Posted: 21 Dec 2016 | Published: 30 Nov 2016

Citrix

Manage Risk by Protecting the Apps and Data that Drive Business Productivity
sponsored by Citrix
WHITE PAPER: Traditional perimeter-based security has been rendered ineffective by mobility and the cloud. In this infographic, learn how to successfully navigate the increasingly volatile IT business environment and take a new approach to information security.
Posted: 21 Dec 2016 | Published: 30 Nov 2016

Citrix

Two-Factor Authentication Helps Officers Protect and Serve New York
sponsored by BlackBerry
WHITE PAPER: Learn how field officers of the Suffolk County Police Department of Long Island, NY utilize two-factor authentication to protect and serve their constituents and keep their database safe.
Posted: 20 Dec 2016 | Published: 30 Nov 2016

BlackBerry

Autodata Speeds the Delivery of Information with API Management
sponsored by TIBCO Software Inc.
CASE STUDY: This case study explores how Autodata implemented an integrated API management platform to simplify key development processes and create new opportunities for IoT. Discover how they leveraged APIs to improve customer service, enhance data security, and more.
Posted: 20 Dec 2016 | Published: 12 Dec 2016

TIBCO Software Inc.

9 Reasons to Ditch Your Spreadsheets
sponsored by Sage Software
RESOURCE: Are you still using spreadsheets to manage your fixed assets? Here are nine reasons why you need to consider replacing your manual spreadsheet management system with something new.
Posted: 20 Dec 2016 | Published: 31 Dec 2015

Sage Software

Protecting the 3 Areas of Secure Mobility
sponsored by BlackBerry
WHITE PAPER: Protect the three areas of secure mobility, whether your users are accessing data locally, on your corporate network, or through a cloud service. Discover how to drive transformative mobility without adding risk to your network and data.
Posted: 20 Dec 2016 | Published: 30 Nov 2016

BlackBerry

Data Breaches: Is Prevention Practical?
sponsored by Palo Alto Networks
RESEARCH CONTENT: Increased reliance on digital environments only expands the attack landscape for data breaches. Explore this survey to find out how organizations are handling data breach prevention and uncover key findings about which preventative practices are most effective for data security.
Posted: 19 Dec 2016 | Published: 30 Sep 2016

Palo Alto Networks

Best Practices for Healthcare Data Breach Prevention
sponsored by Absolute
WHITE PAPER: As healthcare records grow in value and popularity in underground markets, it's more important than ever to have airtight data protection and breach prevention protocols in place to keep patients' information safe. Whether you're in healthcare or another industry, learn how to keep information secure with data breach protection best practices.
Posted: 16 Dec 2016 | Published: 30 Nov 2016

Absolute

Stop Ransomware Before it Starts
sponsored by Carbon Black
EBOOK: There is no single solution to beat ransomware. Learn the history behind ransomware, how it works, and what you can do to protect your valuable assets. Through proper planning and preparations, you can defend your organization and protect your valuable assets.
Posted: 15 Dec 2016 | Published: 30 Nov 2016

Carbon Black

Six Steps to Effective Healthcare Data Breach Response
sponsored by Absolute
WHITE PAPER: Healthcare organizations must take into consideration these 6 steps to an effective data breach response. You'll learn how to not only minimize the damage from an incident, but also avoid reputational ruin through patient notification and timely updates of the situation.
Posted: 15 Dec 2016 | Published: 30 Nov 2016

Absolute

The Cost of a Data Breach: Healthcare Settlements Involving Lost or Stolen Devices
sponsored by Absolute
WHITE PAPER: Whether it is from human error or malicious outsiders, a diligent IT department can diminish the risk of lost or stolen data. Learn 7 best practices healthcare organizations can put in place to ensure the safety of patient information on mobile devices.
Posted: 15 Dec 2016 | Published: 31 Dec 2015

Absolute

The Foundation of Next-Gen Enterprise Security is Embedded in your Endpoints
sponsored by Absolute
WHITE PAPER: As the lines between corporate and personal have blurred, or even blended altogether, the enterprise security team has less and less true control over all of the endpoints being used by employees. Learn how to activate embedded security in your endpoints to ensure complete protection of your valuable assets.
Posted: 14 Dec 2016 | Published: 30 Nov 2016

Absolute

IDC Technology Spotlight: Modern "Embedded" Endpoint Security
sponsored by Absolute
WHITE PAPER: This IDC Technology Spotlight explains why modern endpoint security strategies need an innovative approach that maintains always-on IT connectivity to corporate laptops and mobile devices. Learn how to maintain vigilance and identify threats at the earliest stages before a breach can occur.
Posted: 14 Dec 2016 | Published: 30 Nov 2016

Absolute

How to Determine if Cloud ERP Software is Right for You
sponsored by Sage Software
EGUIDE: Most businesses wait until the pain points grow too large before accepting the need for an ERP system. In this guide, expert IT strategist Adam Boyce helps you determine if cloud ERP software can successfully future-proof your business and explores the differences between on-premise and cloud ERP software.
Posted: 21 Dec 2016 | Published: 19 Dec 2016

Sage Software
1 - 25 of 2412 Matches Previous Page    1 2 3 4    Next Page
 
DATA SECURITY DEFINITION (continued): …  A paper entitled "Cryptovirology: Extortion-Based Security Threats and Countermeasures," written by security experts at Columbia University and IBM, clearly outlined the concept back in 1996. In the past, though, data kidnappers targeted businesses rather than individuals. In March 2006, ransomware known as Crypzip or Zippo circulated to private users on the Internet. Recipients of the Trojan horse program also received an e-mail ransom note demanding $300, to be paid by electronic transfer, for the key required to unlock all their files.A newer type of ransomware uses a Trojan to encrypt files … 
Data Security definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement