Some 80% of businesses that choose to pay to regain access to their encrypted systems experience a subsequent ransomware attack, amongst which 46% believe it to be caused by the same attackers.
Latest from Eileen Yu
Chinese tech giant kicks into PR overdrive, pledging its commitment to cybersecurity with the opening of its latest transparency centre in Dongguan, adding to similar sites in Belgium and the UK, and release of a security baseline framework that it adopts for its products.
US software vendor pulls together 15 policy makers from seven Asia-Pacific markets, including Indonesia, Singapore, and South Korea, to form a cybersecurity executive council that it hopes will exchange threat intelligence and resources in a "timely and open manner".
Social media platforms have been instructed to carry correction notices on posts claiming there is a Singapore strain of COVID-19, though, this order will apply only to their users in the country.
That companies continue to disregard the need for basic cybersecurity hygiene signals the need for firmer action, especially as cybercriminals turn their focus to operational technology sectors and cyber threats can result in real-world physical risks.
Singapore-based data security vendor plans to tap funds from its latest round to support more workload types, such as Netsuite and Salesforce, and add more managed services providers to its partner network.
Citing complaints from users, the Cyberspace Administration of China lists 33 mobile apps it says breached various regulatory rules, mainly, for collecting personal data deemed not necessary to provide their service.
Opt-out process should be easy and available to anyone who does not want advertising to be personalised, says chief science officer at Acquia, which has its own audience cohort analysis tool, and who calls for more transparency and user control.
Adversaries are turning their focus towards cheaper, easier targets within an organisation's supply chain, especially as businesses increasingly acquire software from external suppliers.
Rather than entrust third-party suppliers to keep their supply chain secured, organisations should adopt a zero trust security strategy and establish basic cyber hygiene to safeguard their data.