IT Management  >   Systems Operations  >   Security  >  

Data Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Data Protection, Data-security, Data Theft, Secure Data
DEFINITION: Ransomware is a type of malware used for data kidnapping, an exploit in which the attacker encrypts the victim's data and demands payment for the decryption key. A ransomware program can be installed from an e-mail attachment, an infected program, or a compromised or malicious Web site. Malware used for this purpose is sometimes called a cryptovirus, cryptotrojan or cryptoworm.Ransomware is not new.  … 
Definition continues below.
Data Security Reports
1 - 25 of 2236 Matches Previous Page  |  Next Page
An Examination of Web App Security Process Management
sponsored by White Hat Security
WEBCAST: In this webcast, you'll learn the hard numbers about security vulnerabilities and how susceptible your organization is to being the next victim of an attack. View now to arm yourself with the knowledge to prepare for the inevitable attacks and reduce the likelihood of a data breach.
Posted: 30 Jul 2015 | Premiered: Jul 1, 2015

White Hat Security

3 Strategies to Manage Compliance Mandates
sponsored by Citrix
WHITE PAPER: This white paper focuses on 3 strategies to easily manage compliance. Follow along with these guidelines to prove to senior execs and board members that your company meets all of its requirements and can defensibly prove it.
Posted: 30 Jul 2015 | Published: 09 May 2014

Citrix

Cyber Attack Survival Checklist
sponsored by CrowdStrike
WHITE PAPER: This cyber-attack survival checklist will help you avoid common mistakes and eliminate deficiencies within your existing security measures.
Posted: 30 Jul 2015 | Published: 30 Jul 2015

CrowdStrike

Up-to-the-Minute Global Threat Intelligence
sponsored by IBM
WEBCAST: In this webcast, you'll learn how stay informed with up to the minute cybercrime attack information.
Posted: 30 Jul 2015 | Premiered: Jul 17, 2015

IBM

Today's State of Mobile App Security
sponsored by IBM
WHITE PAPER: Mobile devices are at serious risk of being hacked with threat vectors constantly evolving. Organizations should consider mobile app assessments to determine if existing apps are exposed to risks that are unique to mobile environments. This white paper highlights the way to combat these threats.
Posted: 30 Jul 2015 | Published: 31 Dec 2014

IBM

FlexCast technology powers workforce mobility
sponsored by Citrix
WHITE PAPER: Check out this white paper to discover how FlexCast virtualization technology can help IT departments meet all of their virtualization goals, from enabling BYOD to transforming call centers.
Posted: 30 Jul 2015 | Published: 31 Dec 2013

Citrix

Securing Information in the New Digital Economy
sponsored by Oracle Corporation
WHITE PAPER: This white paper teaches you how to build more effective security by focusing your attention on internal vulnerabilities.
Posted: 30 Jul 2015 | Published: 30 Jul 2015

Oracle Corporation

Empowering Information Security with Desktop Virtualization
sponsored by Citrix
WHITE PAPER: This white paper explores how desktop virtualization can help improve information security control, optimize overall application and desktop management, and spur initiatives that bring significant new opportunities for business growth.
Posted: 30 Jul 2015 | Published: 30 Jul 2015

Citrix

Virtual Server Protection: A Buyer's Checklist
sponsored by Commvault
WHITE PAPER: In this detailed checklist, explore the basic and advanced features you'll need in a virtual server protection solution to safeguard your corporate data.
Posted: 30 Jul 2015 | Published: 31 Dec 2014

Commvault

From BlackBerry to BYOD, CYOD or COPE
sponsored by Citrix
WHITE PAPER: Access this white paper to learn about the security, management, and application delivery features of Blackberry, Apple iOS and Google Android devices. Also, discover a comprehensive enterprise mobility management (EMM) and mobile device management (MDM) platform for BYOD initiatives.
Posted: 30 Jul 2015 | Published: 30 Apr 2015

Citrix

Responding to Unpopular HIPAA Disclosure Requirements
sponsored by Absolute Software
WHITE PAPER: In this research conducted by Gartner, discover the major findings of the HIPAA-HITECH debate between keeping patient information accessible or fully disclosed. Uncover recommendations on how to choose a side, lobby, and enter the public debate.
Posted: 29 Jul 2015 | Published: 27 Sep 2013

Absolute Software

10 Vital Questions for Evaluating Your Mobile Security Strategy
sponsored by Citrix
WHITE PAPER: Mobile security concerns continue to abound in the workplace (from passcode enforcement to device encryption). An end-to-end mobile security framework can allay these concerns. This white paper discusses the 10 "must-have" questions when thinking about mobile device management (MDM) at work.
Posted: 29 Jul 2015 | Published: 31 Dec 2013

Citrix

Taking Your Enterprise Mobile The Executive Checklist
sponsored by Citrix
WHITE PAPER: Access this white paper to explore the top mobile security concerns, including three top factors that contribute to enterprises' security concerns. Also, discover a checklist of key considerations of what to look for in a mobile strategy.
Posted: 29 Jul 2015 | Published: 31 May 2013

Citrix

Why You Need Backup and Disaster Recovery
sponsored by Solarwinds N-able
WHITE PAPER: This white paper makes a strong case for backup and disaster recovery and can help you to convince your clients (or your own company) that this is one of the best investments that a business can make.
Posted: 28 Jul 2015 | Published: 31 Jul 2014

Solarwinds N-able

Business-Critical Documents: Printing You Can Count On
sponsored by Nuance
WHITE PAPER: Improving your cost-effective printing is crucial. Whether printing from a desktop, mobile device or back office system, you can ensure critical and confidential documents are printed at the right place and time.
Posted: 28 Jul 2015 | Published: 27 Sep 2014

Nuance

Web Security Threat Report 2015
sponsored by Symantec
WHITE PAPER: By using data from the most comprehensive global intelligence network in the world, this resource provides a breakdown of each type of cyber-attack and how you can prevent it.
Posted: 28 Jul 2015 | Published: 28 Jul 2015

Symantec

Secure Your Printers and Eliminate Wasteful Costs
sponsored by Nuance
WEBCAST: This brief webcast explores how to reign in printing services in the organization to protect enterprise data. View now to discover how to stop data leaks before they happen and how to eliminate help desk tickets.
Posted: 27 Jul 2015 | Premiered: Feb 13, 2015

Nuance

Case Study: Meeting Compliance with Secure Document Capture and Printing
sponsored by Nuance
WHITE PAPER: Read this case study to discover how the VHA implemented secure document and print management solutions for improved security, compliance, and quality of care.
Posted: 27 Jul 2015 | Published: 31 Dec 2014

Nuance

Cyber Risk Report: Data Breaches and the Healthcare Industry
sponsored by SurfWatch Labs
WHITE PAPER: This white paper presents cybercrime statistics and trends that can help you stay secure despite the numerous threats facing the healthcare industry.
Posted: 24 Jul 2015 | Published: 24 Jul 2015

SurfWatch Labs

Enabling the Hybrid Cloud
sponsored by Zerto
WHITE PAPER: This white paper discusses how you can build a truly effective hybrid cloud by implementing application mobility and cross-platform protection.
Posted: 22 Jul 2015 | Published: 22 Jul 2015

Zerto

Bridging the BYOD security and UX gap
sponsored by HID
WHITE PAPER: This white paper explores the top security challenges of today and presents a holistic strategy to bridge the gap between mobile data security and user experience.
Posted: 21 Jul 2015 | Published: 24 Jun 2015

HID

9 Steps to a Secure Printer
sponsored by Nuance
WHITE PAPER: This white paper discusses just how much danger your printer poses to your organization and gives you nine tips for mitigating that danger.
Posted: 21 Jul 2015 | Published: 31 May 2015

Nuance

Securing your Enterprise in the Cloud
sponsored by Symantec Corporation
WHITE PAPER: This white paper addresses the issue of cloud security and discusses how you can invest in the cloud without putting your business at risk.
Posted: 20 Jul 2015 | Published: 20 Jul 2015

Symantec Corporation

Maximize your Remote Desktop Services
sponsored by Parallels, Inc.
WHITE PAPER: Access this white paper to learn about remote desktop services (RDS) and how it differs from virtual desktop infrastructure (VDI) when delivering virtual desktops to end-users.
Posted: 20 Jul 2015 | Published: 20 Jul 2015

Parallels, Inc.

The Impact of Social Media On Information Security: What Every Company Needs To Know
sponsored by Cyveillance, Inc.
WHITE PAPER: This white paper can show you why security professionals need to pay attention to social media, and what you can do to implement secure social media practices in your organization.
Posted: 17 Jul 2015 | Published: 17 Jul 2015

Cyveillance, Inc.
1 - 25 of 2236 Matches Previous Page    1 2 3 4    Next Page
 
DATA SECURITY DEFINITION (continued): …  A paper entitled "Cryptovirology: Extortion-Based Security Threats and Countermeasures," written by security experts at Columbia University and IBM, clearly outlined the concept back in 1996. In the past, though, data kidnappers targeted businesses rather than individuals. In March 2006, ransomware known as Crypzip or Zippo circulated to private users on the Internet. Recipients of the Trojan horse program also received an e-mail ransom note demanding $300, to be paid by electronic transfer, for the key required to unlock all their files.A newer type of ransomware uses a Trojan to encrypt files … 
Data Security definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement