Results for cyberattacks

Business and Technology | Industry Trends

How Automation and AI Improve Healthcare Cybersecurity

When it comes to protecting patient information and proprietary medical research, the healthcare industry faces significant cybersecurity challenges every day. The adoption of new medical technology—including electronic health records (EHRs), online patient portals, connected devices and wearables—offers improved patient care and convenience. However, it also creates greater opportunity for attack. Of all the industries affected by advances in cybercrime techniques, healthcare providers continue to be at high risk. That’s because...

By Derek MankyFebruary 09, 2018

Business and Technology

Align Your Customers' Business Needs with Security Functionality

Your customers need to align conflicting business and security goals. Learn how Fortinet can provide security and compliance, without hindering business initiatives.

By Lief KoepselJanuary 24, 2018

Business and Technology | Industry Trends

Three of the Biggest Cybersecurity Challenges Facing the Education Sector

Educational institutions have become regular targets for cybercriminals. In fact, the education sector accounted for 13 percent of data breaches in the first half of 2017, resulting in the compromise of around 32 million records. One of the top reasons that schools are targeted is the diverse data they store on students and staff, including personally identifiable information (PII), healthcare information, and financial information. These records can then be sold on the dark web to be used for purposes of identity theft and fraud. As educational...

By Susan BiddleDecember 13, 2017

Business and Technology

How to Achieve Automated, Intelligence-Driven Security

Over the last couple of years, cyberattacks have evolved in both scale and effectiveness, affecting organizations across all industries and geographic regions. Successful cyberattacks are a growing industry-wide problem in spite of billions being spent on cybersecurity solutions. Part of the reason is that new techniques- and in fact a mature supporting cybercrime ecosystem- for penetration and evading detection have reduced the effectiveness of many traditional defenses. The lingering effects of a successful attack often have devastating consequences,...

By Michael XieOctober 17, 2017

Industry Trends

Common Types of Cyberattacks in Education and What We Can Learn from Them

Cybercriminals have increasingly taken notice of schools and universities as profitable targets for cyberattacks. A key reason for this is the types of information schools keep on students, parents, and staff. Typically, upon infiltrating an institution’s network, cybercriminals will probe for, find, and exfiltrate valuable user data. This could be anything from health records, financial information, or any other personally identifiable information, such as social security numbers. Cybercriminals typically then take this data and sell it...

By Susan BiddleOctober 06, 2017

Industry Trends

Adapting to the New Normal with an Informed Cybersecurity Strategy

As cyberattacks become more frequent and impactful, security teams and executives across industries are taking notice. With new strains of malware being constantly reported, organizations want to make sure that their security solutions, and the vendors that provide them, are adapting to defend against this new normal. To ensure they have the capability to deal with these constantly evolving attacks, customers are turning to you, their solution providers, to answer their questions and ensure there is a structured strategy in place to deal with...

By Joseph SykoraSeptember 05, 2017

Industry Trends

Cyberattack Tracker Zeroes in on Firewall Vulnerabilities

Deutsche Telekom's interactive, real-time map of global cyberattacks reveals the bulk of recent attacks -- 27.3 million in February alone -- were against the Server Message Block (SMB), aka the Common Internet File System (CIFS). Reuven Harrison, CTO and co-founder of Tufin, a security and lifecycle management company and Fortinet solution partner, wrote in a blog that the map's revelations are significant. This attack vector, he explains, operates across an application-layer network protocol mainly used to provide shared access to files, printers,...

By Stefanie HoffmanJuly 30, 2012