<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>ransomware &#8211; Scolvo</title>
	<atom:link href="https://scolvo.com/corinfo/blog/tag/ransomware/feed/" rel="self" type="application/rss+xml" />
	<link>https://scolvo.com/corinfo</link>
	<description>work.regardless</description>
	<lastBuildDate>Mon, 11 Sep 2017 09:28:06 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=5.4.4</generator>

<image>
	<url>https://scolvo.com/corinfo/wp-content/uploads/2020/07/ic_launcher.png</url>
	<title>ransomware &#8211; Scolvo</title>
	<link>https://scolvo.com/corinfo</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Mobile Ransomware Attacks: Don&#8217;t Let Your Business Apps Fall Prey to Malicious Code</title>
		<link>https://scolvo.com/corinfo/blog/2017/09/11/mobile-ransomware-attacks-dont-let-your-business-apps-fall-prey-to-malicious-code/</link>
		
		<dc:creator><![CDATA[Krisztian Toth]]></dc:creator>
		<pubDate>Mon, 11 Sep 2017 07:20:48 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[applications]]></category>
		<category><![CDATA[enterprise]]></category>
		<category><![CDATA[mobile]]></category>
		<category><![CDATA[mobility]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[security]]></category>
		<guid isPermaLink="false">https://scolvo.com/?p=18344</guid>

					<description><![CDATA[<p>Due to some recent major cyber attacks like Petya and Locky, security has again made it to the top list of concerns of businesses worldwide as they are learning the hacker slang the hard way. Should security be one of your primary concerns, too, we give you a realistic overview of the threats and also [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://scolvo.com/corinfo/blog/2017/09/11/mobile-ransomware-attacks-dont-let-your-business-apps-fall-prey-to-malicious-code/">Mobile Ransomware Attacks: Don&#8217;t Let Your Business Apps Fall Prey to Malicious Code</a> appeared first on <a rel="nofollow" href="https://scolvo.com/corinfo">Scolvo</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><span style="font-weight: 400;">Due to some recent <a href="https://www.nytimes.com/2017/06/27/technology/ransomware-hackers.html">major</a></span><a href="https://www.nytimes.com/2017/06/27/technology/ransomware-hackers.html"><span style="font-weight: 400;"> cyber attacks like Petya an</span></a><span style="font-weight: 400;"><a href="https://www.nytimes.com/2017/06/27/technology/ransomware-hackers.html">d Locky</a>, security has again made it to the top list of concerns of businesses worldwide as they are learning the hacker slang the hard way. </span></p>
<p><span id="more-18344"></span></p>
<p><span style="font-weight: 400;">Should security be one of your primary concerns, too, we give you a realistic overview of the threats and also some useful tips on how you can protect your business from such attacks. And not only on the good old desktop: as smartphones are on the way to become the most used devices in the workplace, you need to get ready to protect them as well!</span></p>
<p><img class="aligncenter size-full wp-image-18346" src="https://scolvo.com/wp-content/uploads/2017/09/ransomware.png" alt="mobile ransomware" width="1000" height="750" srcset="https://scolvo.com/corinfo/wp-content/uploads/2017/09/ransomware.png 1000w, https://scolvo.com/corinfo/wp-content/uploads/2017/09/ransomware-300x225.png 300w, https://scolvo.com/corinfo/wp-content/uploads/2017/09/ransomware-768x576.png 768w, https://scolvo.com/corinfo/wp-content/uploads/2017/09/ransomware-94x70.png 94w, https://scolvo.com/corinfo/wp-content/uploads/2017/09/ransomware-600x450.png 600w, https://scolvo.com/corinfo/wp-content/uploads/2017/09/ransomware-900x675.png 900w" sizes="(max-width: 1000px) 100vw, 1000px" /></p>
<p>&nbsp;</p>
<h2><span style="font-weight: 400;">Business desktops under attack again</span></h2>
<p><span style="font-weight: 400;">Malicious code that blocks access to data or a whole computer by encrypting the files seems a successful recipe for easy money and extensive media attention. They provided an opportunity to talk digital security strategies good and bad as </span><a href="https://en.wikipedia.org/wiki/WannaCry_ransomware_attack"><span style="font-weight: 400;">WannaCry</span></a><span style="font-weight: 400;"> hit corporations like Renault, Deutsche Bahn, and FedEx, and </span><a href="https://www.theguardian.com/world/2017/jun/27/petya-ransomware-attack-strikes-companies-across-europe"><span style="font-weight: 400;">a reinvented version of Petya </span></a><span style="font-weight: 400;">made its way to Russian and Ukrainian banks, Maersk, and WPP. </span></p>
<p><span style="font-weight: 400;">And this is not ‘just’ about the desktops anymore. With less publicity, attacks such as <a href="https://nerdssupport.com/rise-android-trojan/">Fusob</a>, <a href="https://threatpost.com/svpeng-behind-a-spike-in-mobile-ransomware/126533/">Svpeng</a>, and SMALL, also threatened mobile devices and systems  </span><span style="font-weight: 400;">&#8211; just to mention a few. Enterprise mobility is no safe territory, anymore, and the vulnerability goes further than a weak endpoint: we&#8217;re talking about personal consumer devices storing or accessing company data. </span></p>
<p>&nbsp;</p>
<h2><span style="font-weight: 400;">Corporate security strategies revised</span></h2>
<p><span style="font-weight: 400;">The broad reach of attacks forced many companies to alter their security policies regarding user control, transparency, the IT-departments’ role, and general awareness, especially as more and more enterprise software has its mobile version developed. </span></p>
<p><span style="font-weight: 400;">The risks can no longer be denied: there is much to do about:</span></p>
<ul>
<li style="font-weight: 400;"><span style="font-weight: 400;">A workforce that is increasingly mobile but not necessarily more experienced in protecting corporate data.</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">The volume and types of devices used in a workplace and how these devices handle data.</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Reshuffling IT’s priorities: taking security measures, educating a wider group of stakeholders. </span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Analysing all the possible effects of a data breach on the business.</span></li>
</ul>
<p><span style="font-weight: 400;">Besides the prevention measures mentioned above, you will also need protection. For example, anti-virus software makers are also adding their part in preparing for more assistance and expanding even more in the mobile space. </span></p>
<p><span style="font-weight: 400;">Symantec was the last to make the news with two recent acquisitions: </span><a href="https://thestack.com/security/2017/07/12/symantec-to-acquire-israeli-mobile-security-startup-skycure/"><span style="font-weight: 400;">the Israeli Skycure</span></a><span style="font-weight: 400;"> with a focus on predictive threat detection, and </span><a href="http://investor.symantec.com/About/Investors/press-releases/press-release-details/2017/Symantec-to-Acquire-Fireglass-to-Bring-a-Generational-Leap-Forward-in-User-Protection/default.aspx"><span style="font-weight: 400;">Fireglass </span></a><span style="font-weight: 400;">with a browser isolation technology that helps to stop the spreading of malware. </span></p>
<p><a href="https://hitinfrastructure.com/news/trend-micro-adds-mobile-security-device-monitoring-tools"><span style="font-weight: 400;">VMWare has partnered up with Trend Micro</span></a><span style="font-weight: 400;"> to provide better protection against mobile attacks. It does that by allowing IT-administrators to get a birds-eye view of their (ever-growing) network, quickly identify threats, and make more informed decisions based on what they saw.</span></p>
<p>&nbsp;</p>
<h2><span style="font-weight: 400;">Securing mobile business applications in a future-proof way </span></h2>
<p><span style="font-weight: 400;">The first step is to accept that every business is at risk: big or small, with or without a field team, working on any operating system. Also, every application is vulnerable to some extent. </span><span style="font-weight: 400;">Then, take time to understand your current type and level of protection, so you&#8217;ll know what you&#8217;re missing: this way, you can react faster in case of an attack.</span></p>
<p>&nbsp;</p>
<h3><span style="font-weight: 400;">More focus on user behavior</span></h3>
<p><span style="font-weight: 400;">In protecting your data in association with mobile apps, user behavior is crucial. From this perspective, your Millennial workforce might be the more at risk. </span></p>
<p><span style="font-weight: 400;">With a security awareness training, you can educate your staff about best practices, such as regularly updating the apps they use and the safety implications of sending mobile data through public wireless networks. </span></p>
<p><span style="font-weight: 400;">The best business mobile apps update themselves automatically for more protection, but it&#8217;s always worth to double-check.</span></p>
<p>&nbsp;</p>
<h3><span style="font-weight: 400;">Application control </span></h3>
<p><span style="font-weight: 400;">As apps are becoming more and more dominant in the modern workplace, their integration becomes more important as well. The anti-virus software, the MDM or EMM should all work together in stopping any possible attacks and allow for maximum security. </span></p>
<p><a href="https://scolvo.com/2016/09/30/indispensable-security-solutions-mobile-app/"><span style="font-weight: 400;">Solutions </span></a><span style="font-weight: 400;">that are independent of the location of the data, like precisely setting access rights and multi-level identification app by app, generally work well. </span></p>
<p><span style="font-weight: 400;">The successful combination of these methods might vary by company, but the goal is clear: to pass </span><a href="https://scolvo.com/2017/02/10/5-checkpoints-pass-secure-mobile-business-app/"><span style="font-weight: 400;">the five security checkpoints</span></a><span style="font-weight: 400;"> of a secure mobile business app. These checkpoints are the following:</span></p>
<ul>
<li style="font-weight: 400;"><span style="font-weight: 400;">Secure code. Developers use encryption, audits, reviews, testing, approval processes to make sure no malicious code could appear. </span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Secure data. Proper and up-to-date encryption of data ensures protection against misuse. </span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Secure access. Role-based access provides an extra layer of security to passwords. </span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Secure communication. The mobile app and the back-end should communicate with proper encryption and authentication protocols, like SSL/TLS. </span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Secure third-party services. The risk of each provider should be assessed and their security and risk management program revised. </span></li>
</ul>
<p><span style="font-weight: 400;">If you are aware of the industry standards, best practices, and user-generated issues that might have an impact on security, you have already taken a big step forward in securing your mobile business apps. </span></p>
<p>The post <a rel="nofollow" href="https://scolvo.com/corinfo/blog/2017/09/11/mobile-ransomware-attacks-dont-let-your-business-apps-fall-prey-to-malicious-code/">Mobile Ransomware Attacks: Don&#8217;t Let Your Business Apps Fall Prey to Malicious Code</a> appeared first on <a rel="nofollow" href="https://scolvo.com/corinfo">Scolvo</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
