Allscripts: Ransomware, recovery, and frustrated customers

Email not displaying correctly? View it in your browser.

CSO

CSO Update

Apr 15, 2018
Featured Image

Adobe’s CSO talks security, the 2013 breach, and how he sets priorities

Brad Arkin has led Adobe's new approach to security and aims to make sure one of history’s biggest data breaches doesn’t happen again. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

Allscripts: Ransomware, recovery, and frustrated customers
5 myths of API security
How to stop wasting money on security shelfware
Reputational risk and social media: When you're blocked or banned without notice
Why you’re failing to focus on your biggest IT security threats
Microsoft Windows 10 vs. Apple macOS: 18 security features compared

White Paper: Webroot Software

2018 Webroot Threat Report

The 2018 edition of our annual Threat Report shares a glimpse into our discoveries and analysis of threat activity throughout 2017, to equip you with the knowledge you need to overcome modern cybercrime. Read More

Thumbnail Image
INSIDER

Allscripts: Ransomware, recovery, and frustrated customers

The actors behind SamSam launched an attack against Allscripts in January 2018, leaving the company’s customers without access to the services needed to run their medical practices — some for more than a week. Read More

Thumbnail Image

5 myths of API security

In light of Panera Bread’s API-related data breach, here what is — and isn’t — true about protecting application programming interfaces. Read More

Thumbnail Image
INSIDER

How to stop wasting money on security shelfware

Investing in security tools that end-up on the shelf or underutilized is not inevitable, and it can be reduced or even eliminated by some proactive and surprisingly simple first steps. Read More

Thumbnail Image

Reputational risk and social media: When you're blocked or banned without notice

Businesses depend on sites like Facebook, Twitter, Dropbox, and Apple to interact with customers, promote their messages and store content. One complaint against you can shut you off from those services and damage your brand. Read More

Thumbnail Image
INSIDER

Why you’re failing to focus on your biggest IT security threats

Most companies are not focused on the real security threats they face, leaving them ever more vulnerable. That can change if they trust their data rather than the hype. Read More

Thumbnail Image
INSIDER

Microsoft Windows 10 vs. Apple macOS: 18 security features compared

Here's how the world's two most popular desktop OSes keep systems and data safe from malware, unauthorized access, hardware exploits and more. Read More

White Paper: QTS

A New Era: Hybrid IT and the Fully-Integrated Provider

In every industry, IT professionals are watching their roles and objectives evolve rapidly. The world is now digital and data is at the core of how enterprises, governments and individuals manage their core functions. The impact of data is being felt beyond the IT department; it is reverberating through every aspect of our lives. Read More

CSO Insider

1. 14 top tools to assess, implement, and maintain GDPR compliance
2. What are the GDPR requirements?
3. Third-party security vetting: Do it before you sign a contract
4. Separation of duties and IT security
5. Review: Bricata adds threat hunting to traditional IPS/IDS

Editor's Picks

1. Rogues' gallery: 7 insiders who breached security
2. Why you don't need an RFID-blocking wallet
3. The 6 best password managers
4. 8 hot cyber security trends (and 4 going cold)
5. The 10 Windows group policy settings you need to get right
Twitter Facebook LinkedIn Google+

You are currently subscribed to CSO Update as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright © 2018 CSO Online, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.