Tag Archive for: LongTerm

The long-term psychological effects of ransomware attacks


Northwave has conducted scientific research into the psychological effects of a ransomware crisis on both organizations and individuals. The findings reveal the deep marks that a ransomware crisis leaves on all those affected. It also shows how their IT and security teams can turn in disarray long after the crisis itself has passed.

psychological effects ransomware

Key findings on psychological effects of ransomware

“The research reveals how the psychological impact of ransomware attacks can persist on people in affected organizations for a very long time,” explains Organizational Psychologist Inge van der Beijl, Director Behaviour & Resilience at Northwave. “It shows that crisis team members may develop serious symptoms far later. Top management and HRM need to take measures against this, in fact right from the very beginning of the crisis. They are the ones bearing responsibility for the well-being of their staff.”

She continues: “We also discovered how teams haven fallen apart some time after the crisis, with members leaving or staying home on sick-leave. The study reveals that effects can linger throughout the organization. All in all the investigation shows that this invisible impact of a cyber crisis is an issue for the general business management, and certainly also for HRM.”

Northwave regards the response to a cyberattack as occurring in three phases. First comes the actual crisis situation, which evolves into an incident phase after about a week. A plan of action is then in place, and recovery measures are launched. The fire has been largely extinguished after a month or so, with the first (basic) functionalities available again.

Full recovery can take one to two years. Each phase has its specific effects on the minds and bodies of those involved, and by extension, on the organization or parts of it. “In average a company is down for three weeks following a malware attack,” notes Van der Beijl. “But it surprised us that the impact persists for so long afterwards. Psychological issues are still surfacing a year after the actual crisis.”

  • One of every seven employees involved in the attack, either directly or indirectly, exhibits severe enough symptoms several months later,…

Source…

AV-Comparatives Releases Long-Term Test of 18 Leading Endpoint Enterprise & Business Security Solutions / July 2022


The threat landscape continues to evolve rapidly, presenting antivirus vendors with new challenges. The test report shows how security products have adapted to these and improved protection over the years.

To be certified in July 2022 as an ‘Approved Business Product’ by AV-Comparatives, the tested products must score at least 90% in the Malware Protection Test, with zero false alarms on common business software, a rate below ‘Remarkably High’ for false positives on non-business files and must score at least 90% in the overall Real-World Protection Test over the course of four months, with less than one hundred false alarms on clean software/websites.

Endpoint security solutions for enterprise and SMB from 18 leading vendors were put through the Business Main-Test Series 2022H1: Acronis, Avast, Bitdefender, Cisco, CrowdStrike, Cybereason, Elastic, ESET, G Data, K7, Kaspersky, Malwarebytes, Microsoft, Sophos, Trellix, VIPRE, VMware and WatchGuard.

Real-World Protection Test: The Real-World Protection Test is a long-term test run over a period of four months. It tests how well the endpoint protection software can protect the system against Internet-borne threats.

Malware Protection Test:
The Malware Protection Test requires the tested products to detect malicious programs that could be encountered on the company systems, e.g. on the local area network or external drives.

Performance Test:
Performance Test checks that tested products do not provide protection at the expense of slowing down the system.

False Positives Test:
For each of the protection tests, a False Positives Test is run. These ensure that the endpoint protection software does not cause significant numbers of false alarms, which can be particularly disruptive in business networks.

Ease of Use Review:
The report also includes a detailed user-interface review of each product, providing an insight into what it is like to use in typical day-to-day management scenarios.

Overall, AV-Comparatives’ July Business Security Test 2022 report provides IT managers and CISOs with a detailed picture of the strengths and weaknesses of the tested products, allowing them to make informed decisions on which ones might be appropriate for their…

Source…

No security smarts at Mensa, long-term identity theft, and GameStop’s share frenzy • Graham Cluley


Recorded Future’s podcast, Inside Security Intelligence, takes a deep dive into the world of cyber threat intelligence

They share stories from the trenches and the operations floor, giving you the lowdown on established and emerging adversaries

Whether it’s the SolarWinds breach, 5G conspiracy theories, or Russian election interference, Inside Security Intelligence gives you a fresh take from a variety of industry experts.

Find the Inside Security Intelligence podcast in your favourite podcast app, or at recordedfuture.com/podcast

Source…

Three critical cyber security actions companies should take as employees continue remote work long-term – Jacksonville Business Journal

Three critical cyber security actions companies should take as employees continue remote work long-term  Jacksonville Business Journal
“computer security news” – read more