Remove Backup Remove Fractional CTO Remove Malware
article thumbnail

InfoSec Policies and Standards: Some strategic context for those just diving into this world

CTOvision

Backup Policy. Legal experts need to be consulted if you want to know what level of encryption is allowed in an area. Albert Fruz has five years experience in the information security field, encompassing SIEM, malware analysis, investigating security incidents, ISO 2700` audits and hardening of various devices. Virus Policy.

Policies 268
article thumbnail

North Korean Threat Actors Targeting Healthcare Sector with Maui Ransomware

SecureWorld News

The figure below shows Maui command line usage details: The report continues: "Embedded usage instructions and the assessed use of a builder is common when there is an operational separation between developers and users of a malware family. Implementing HIPAA security measures can prevent the introduction of malware on the system.".

article thumbnail

7 challenges facing CIOs and IT leaders in 2020

mrc's Cup of Joe Blog

The most obvious answer is pay a premium for the best talent, or hire consultants with modern skills. photo credit: JavadR via pixabay cc In case you’re unfamiliar, ransomware is exactly what it sounds like: Malware that holds your files ransom. How can you address this challenge? Of course, not many companies can afford this option.