data security, regulatory and privacy management

Compliance, Security, Data Masking, New York, Connecticut, New Jersey, Massachusetts, Rhode Island

GRT provides expert IT Risk Management, Data Security, Data Privacy, Data Masking and Regulatory Compliance consulting services to companies in the United States and arround the world.

data security, regulatory and privacy management

business intelligence, operational, analytic and business reporting

Business Intelligence, New York, Connecticut, New Jersey, Massachusetts, Rhode Island

GRT assists you in development, design and implementation of a data warehouse and business intelligence strategy that ensures common framework across the enterprise.

business intelligence, operational, analytic and business reporting

Information strategy, gap analysis, tactics, design and implementation

Data Warehouse and Business Intelligence Staffing Solutions, New York, Connecticut, New Jersey,  Massachusetts, Rhode Island

GRT is a leader among expert staffing solutions in IT functions associated with Data Security, Business Intelligences and Data Warehouse. We help you meet your information management consulting and staffing needs.

Information strategy, gap analysis, tactics, design and implementation

"Pay Up, or Your Data Gets It!"

"Pay Up, Or Your Data Gets It!"Continuing our survey of current security threat trends as identified by Trend Micro, we look at the rise in ransomware. This type of malware does roughly the opposite of simply stealing data: Instead, it threatens to lock up data so that no one will have access to it, including the data's rightful owner. And, all too often, organizations are paying the ransom in order to get their critical data back.

As Trend Micro suggests in its TrendLab 2013 Annual Security Roundup, the rise of ransomware goes hand in hand with broader contemporary trends in malware and cybercrime in general. 

One of these trends, fueled by the dramatic growth in mobile banking, is attacks specifically targeting mobile banking. Such attacks take advantage of mobile users who are surrounded by distractions, and even more careless about security. A related cybercrime trend is a growing focus on straightforward monetary theft. As the report notes, "malware that went straight for victims’ money not only rose in number; they also targeted users in more regions."

Make no mistake: Data is still at risk of being stolen or compromised by cyberthieves. But their ultimate goal is money, and the easiest way to get it, with the fewest intermediate steps, is simply to steal it. And the enormous number of mobile transactions offers more opportunities.

At the same time, however, criminals have also realized that data is valuable to its owners even if it cannot be readily sold on the black market. Hence the potential for taking data hostage and demanding a ransom for it.

Most ransomware makes use of a technology - encryption - that has more often been associated with security and privacy protection. But once malware gains access to a network it can encrypt data stored on the network, so that the network and data owner(s) can no longer read it. The cybercriminal then demands payment for decrypting the data and thus returning it to usable form.

Let GRT Corporation be your partner in safeguarding your critical data, including protective measures to minimize the risk that it might be held for ransom.