infection

Results 1 - 25 of 43Sort Results By: Published Date | Title | Company Name
Published By: Cox Business     Published Date: Apr 27, 2017
ealthcare workers understand the complexity of fighting infections better than most. As medications are developed, germs evolve and become resistant to those medications. Over time, germs become incredibly complex and difficult to treat as they continue to evolve and adapt. Unfortunately, computer viruses seem to be following a similar pattern—and the healthcare industry is struggling to catch up.
Tags : 
    
Cox Business
Published By: Fortinet EMEA     Published Date: Nov 26, 2018
When it comes to securing all the parts of a modern distributed network, endpoints remain the most vulnerable outlier. Mobility has brought a flood of different devices that cross in and out of enterprise networks on a daily basis. This public exposure, combined with inadequate traditional endpoint security and a high degree of user autonomy, makes these devices prime targets for malware infections and other forms of sophisticated attack that seek to exploit the broader organization. And threat actors are finding enormous success along these vectors. To stay competitive, most organizations are currently embracing digital transformation (DX)—including cloud services, smart Internet of Things (IoT) devices, and greater mobility. These adaptations provide organizations with faster and more seamless access to critical information, regardless of the device being used to access it. However, as distributed networks expand and become more difficult to manage, the endpoint remains a weak link i
Tags : 
    
Fortinet EMEA
Published By: Cisco     Published Date: Oct 08, 2015
This paper outlines and explains the 5 steps to help defend your network from infection, hacking and hard to detect threats.
Tags : 
network defense, hacking, detecting threats
    
Cisco
Published By: Cisco Umbrella EMEA     Published Date: Dec 03, 2018
What is ransomware? Ransomware is a malicious software designed to hold a user’s files (such as healthcare records, financial contracts, manufacturing blueprints, software code, and other documents) for ransom by encrypting them and demanding the user pay a fee (often in Bitcoin) to decrypt them. How ransomware works Attackers initiate attacks using an array of tactics. Ransomware infections often first begin with an exploit kit — which are software kits designed to identify software vulnerabilities on endpoints and then upload and execute malicious code on the endpoint. Although variants of ransomware behave differently — there are many ways that Cisco can help. Download this whitepaper today to find out more.
Tags : 
    
Cisco Umbrella EMEA
Published By: Cisco Umbrella EMEA     Published Date: Dec 03, 2018
“Does Cisco Umbrella block ransomware?” This is one of the most common questions that we hear from customers. In reality, the answer for any security provider — including Cisco — is seldom an absolute “yes” or “no.” It really depends on how each variant arrives onto your systems, as well as its order of operations for encrypting data for ransom. However, with Cisco you can significantly reduce the number of ransomware infections across your organization.
Tags : 
    
Cisco Umbrella EMEA
Published By: McAfee     Published Date: Sep 15, 2014
Attacks today incorporate increasingly sophisticated methods of social engineering and client-side software manipulation to exfiltrate data without detection. Some attackers leverage so-called spearphishing to entice employees to give up access information and spread their attacks to other enterprise systems; others use password crackers against compromised applications in order to gain further access rights to the network. The attackers might also set up channels for command and control communications with the compromised systems, as in the case of the Zeus or SpyEye bot infections.
Tags : 
network protection, it security, firewall, hacker detection, security management
    
McAfee
Published By: Sophos     Published Date: Mar 30, 2017
With an estimated 500,000 'Internet of Things' devices using default security credentials it's little wonder that the recent Mirai botnet's DDoS attack was able to cause such widespread disruption. But it isn't just the average home-user that's at risk. Organizations like yours are being targeted with bespoke malware in order to compromise your network and add your servers and devices to malicious botnets. This paper explains why these attacks are so successful, how a typical infection takes place and what security systems your organization should have in place to defend against botnet proliferation.
Tags : 
web protection, email protection, web application firewall, intrusion protection, sandboxing, threat protection
    
Sophos
Published By: Sophos     Published Date: Mar 30, 2017
Ransomware threats like Cryptowall, TeslaCrypt, and Locky are on the rise, targeting organizations of all sizes. This paper explains how these attacks work, and why a large number of new infections continue to surface despite existing protective measures. It also provides practical short- and long-term steps that organizations should take to protect against them.
Tags : 
security solutions, ransomware, security technologies, protection technologies, malicious email, it security, server protection
    
Sophos
Published By: Blue Coat     Published Date: Nov 23, 2015
When it comes to mobile malware threats, 2015 was a vicious year. While the threats are familiar suspects, their complexity and frequency are at an all-time high, including instances of ransomware and stealthy insertions via spyware on devices. Learn how infections start; simple ways to strengthen corporate defenses; and what the future of mobile threats looks like.
Tags : 
    
Blue Coat
Published By: Webroot UK     Published Date: Feb 04, 2013
This case study describes how a technology company with globally dispersed locations addressed concerns about Web security. These included an increasing number of mobile workers, numerous malware infections on its network, and the legal and financial risks of employees accessing inappropriate material on the Internet.
Tags : 
cascade, microtech, security, maleware protection, web proxy, reduced, workload, benefits
    
Webroot UK
Published By: Kaspersky     Published Date: Feb 05, 2015
This paper gives information about how Automatic Exploit Prevention significantly reduces the risk of infection from widespread malware, or more targeted attacks using exploits – even when a zero-day vulnerability is used.
Tags : 
benefits to enterprise it security, exploit prevention, protection from exploits, software attacks
    
Kaspersky
Published By: CREDANT Technologies     Published Date: Feb 10, 2011
This two-part whitepaper will address some of the best practice approaches that you may wish to evaluate and potentially adopt in order to reduce the risk of USB devices becoming the source of a significant leak or virus infection.
Tags : 
credant technologies, removable media, best practices, security, usb device, corporate governance, virus infection
    
CREDANT Technologies
Published By: McAfee     Published Date: Feb 06, 2013
Monitor memory operations in real time, and stop unknown, zero-day infections before they have a chance to do damage.
Tags : 
rootkits, kernel-mode malware, malware signatures, operating system level heuristics, kernel-mode rootkits, user-mode rootkits, koutodoor, tdss
    
McAfee
Published By: Castlight Health     Published Date: May 06, 2014
Poor quality of care takes a tremendous toll, not just on the system as a whole, but on the patients and their families at the center of that system. It also has a tremendous effect on employers, who already face unsustainable health care costs. When we evaluated one of our customer's claims, we found numerous signs of preventable complications that had cost our client significant amounts, not to mention the toll on the individual. Specifically, we identified the following preventable hospital- acquired conditions (HACs): • Fourteen instances of stage III and IV pressure ulcers • Twelve instances of vascular catheter-associated infections • Thirteen instances of catheter-associated urinary tract infections • One instance of a patient dying or experiencing a serious disability associated with intravascular air embolism • Five instances of foreign objects remaining in patients after a procedure. Please download the whitepaper to learn more!
Tags : 
healthcare, healthcare quality, intravascular air embolism, preventable complications, castlight health, hospital-acquired conditions, medical errors, health insurance
    
Castlight Health
Published By: Citrix Systems     Published Date: Feb 14, 2019
"Ransomware is one of the biggest nightmares facing IT today. Hackers are targeting organizations of all kinds with malware designed to encrypt crucial data—and hold it hostage until payment is made. This white paper reveals four highly effective measures for reducing your exposure to ransomware and keeping your apps and data accessible to authorized users—not hackers and their clients. Download this white paper to learn how to: - Shield users of web apps from infection and keep sensitive data off the endpoint - Prevent email-born ransomware from compromising the endpoint - Protect mobile devices against attack - Ensure the rapid recovery of ransomware-encrypted data"
Tags : 
    
Citrix Systems
Published By: MX Logic     Published Date: May 21, 2008
In this recent report, the Aberdeen Group’s research revealed that 100% of Best-in-Class companies consume some managed security services as part of their security strategy. The most widely deployed and easiest to implement managed security service is email security.
Tags : 
managed security services, managed services, email security, security solutions, web security, security incidents, data loss, malware infections
    
MX Logic
Published By: Webroot UK     Published Date: Dec 20, 2013
The Webroot® Intelligence Network (WIN) is a key component of a revolutionary approach to next-generation malware protection. Together, WIN and Webroot is combined with Webroot’s ultra-efficient endpoint agent — Webroot® SecureAnywhere™ Business - Endpoint Protection ensure that both known and... that both known and unknown infections are removed before they do harm.
Tags : 
webroot, passmark software, webroot security, endpoint protection, performance benchmark, testing, endpoint security
    
Webroot UK
Published By: ThreatTrack Security     Published Date: Jan 22, 2015
Stillwater Medical Center: Healthcare provider with 1,000 employees chooses VIPRE after its old antivirus kept crashing systems, disrupting operations and failing to protect against malware infections. Learn how this hospital cured its antivirus ills with VIPRE.
Tags : 
threattrack, security, threat, track, information, admins, best, practices
    
ThreatTrack Security
Published By: BitSight Technologies     Published Date: Sep 26, 2016
Learn how ransomware is evolving - and which industries are the most susceptible to attacks. Read this BitSight Insights report to learn: - How the rate of ransomware infections has grown over the past year - Which industries have exhibited the most ransomware infections - How businesses can directly mitigate the threat of ransomware infections, as well as infections originating from third party vendors and suppliers
Tags : 
bitsight, cyber crime, cyber attacks, ransomware, cyber security, security
    
BitSight Technologies
Published By: Cyphort     Published Date: Jun 28, 2016
Computer viruses have plagued personal computers since the original Brain virus began infecting boot sectors in 1986. Originally, these early viruses were annoying, but fundamentally benign in nature. However, once the initial concept of malicious propagating code became established, the actors creating viruses became more sophisticated in their approach. Ultimately, the results of a successful infection were more significant and the impact on an enterprise more severe.
Tags : 
technology, security, best practices, solutions, network management
    
Cyphort
Published By: Carbonite     Published Date: Feb 22, 2017
Refuse to surrender to cybercriminals—learn the best ways to prevent a ransomware infection, and what you can do in the event of an attack.
Tags : 
backup and recovery, business backup, cloud backup, computer backup, hybrid backup, data backup, data protection, data recovery
    
Carbonite
Published By: Carbonite     Published Date: Feb 22, 2017
Find out how a lack of preparation puts businesses at risk from ransomware—and get expert advice on how to protect your data.
Tags : 
backup and recovery, business backup, cloud backup, computer backup, hybrid backup, data backup, data protection, data recovery
    
Carbonite
Published By: McAfee     Published Date: Mar 31, 2017
The Adwind Remote Administration Tool is a backdoor Trojan written in Java language that targets various platforms that support Java files. Adwind does not exploit any vulnerabilities. In most cases, for an infection to succeed, the user must run the malware by double-clicking the .jar file that is usually distributed as an attachment, or opening an infected Microsoft Word document. The infection spreads if the Java Runtime Environment is installed on the user's computer. After the malicious .jar file is executed on the target system, the malware installs silently and connects to a remote server via a preconfigured port to receive commands from a remote attacker and perform other illegal operations.
Tags : 
backdoor trojans, trojan protection, malware, malware protection
    
McAfee
Published By: Workfront     Published Date: Jan 22, 2015
Are workplace zombies killing productivity? Is frustration and discouragement spreading through your team like a virus? The Working Dead can show up in any workplace. You need to identify these zombies in your workplace and cure them before you have a workplace zombie apocalypse on your hands. Use this guide and learn how to: • Turn chaos into process • Unite team members around strategic priorities • Transform confusion into clear-eyed efficiency Bring your team back from the undead—back to doing the work they enjoy. Get this guide and start defending your office today!
Tags : 
workplace environment, strategic priorities, clear-eyed efficiency, productivity, time management
    
Workfront
Published By: TrendMicro     Published Date: May 09, 2011
The test doesn't just score how well a product can detect file-based threats (Infection Layer), but includes the ability to block the threat at its source (Exposure Layer) and detect/block the threat during execution (Dynamic Layer). Click here to see the results.
Tags : 
trendmicro, endpoint security, benchmark testing, av-test.org
    
TrendMicro
Previous   1 2    Next    
Search      

Add Research

Get your company's research in the hands of targeted business professionals.