
Calling the bluff of breachstortion gangs
Confidence in the defences and using backup data to test and assess is key to standing up to the latest criminal demands
As if ransomware alone weren't enough of a headache for firms, now we have a new way for attackers to abuse stolen data: 'breachstortion'. Where ransomware typically involves a malicious actor shutting...
To continue reading this article...
Join Computing
- Unlimited access to real-time news, analysis and opinion from the technology industry
- Receive important and breaking news in our daily newsletter
- Be the first to hear about our events and awards programmes
- Join live member only interviews with IT leaders at the ‘IT Lounge’; your chance to ask your burning tech questions and have them answered
- Access to the Computing Delta hub providing market intelligence and research
- Receive our members-only newsletter with exclusive opinion pieces from senior IT Leaders