13 Effective Security Controls for ISO 27001 Compliance When using Microsoft Azure

“This paper provides insight into how organizations can use thirteen security principles to address critical security and compliance controls, and how these controls can fast track an organization’s ability to meet its compliance obligations using cloud-based services. “ The document “13 Effective Security Controls for ISO 27001 Compliance When using Microsoft Azure” can be download from the following link.
no comments

Ransomware: Best Practice, Prevention and Damage Mitigation

January 9, 2016

Introduction "What is Ransomware? Ransomware is a particularly aggressive form of malware that poses a serious threat to individuals, businesses and other organizations. It blocks access to a computer system by locking the screen or locking the files with a password until the victim pays a fee. Cryptolocker is a sophisticated form of ransomware that encrypts the victim's files and data. A ransomware infection can quickly spread throughout a network. It typically announces itself via a popup window informing the victim that their files have been encrypted and the private encryption key will be destroyed unless they pay a...