“You Hacked.” Unexpected lessons from a ransomware attack on public services

Posted by:

You know it is a bad day when your computer screen blips up with this ransomware message:


“You Hacked, ALL Data Encrypted. Contact For Key (cryptom27@yandex.com)ID:681, Enter.”

But if the day is Black Friday, and your computer is part of a major US city’s municipal transit system, I think we can all agree that this constitutes a very, very, bad day indeed.

This was the ransomware message presented on hundreds of SFMTA (San Francisco’s transit agency) computer screens on Black Friday – 25 November.

The ...

Read More →
0

Three BIG security threat predictions for 2016: Make sure you are covered!

Posted by:

With many security companies pushing out their threat predictions for 2016, we thought it best to review as many as we could in order to compile a definitive list of what to look out for in this coming year.

And, as independent consultants without any direct or indirect ties to specific security providers, we are well placed to provide an product-agnostic perspective on the state of security in 2016.

More importantly, we wanted to give you expert advice on how you can ...

Read More →
0

SEC Could Pressure Companies To Tighten CyberSecurity

Posted by:

SEC data breach reportingThe Securities and Exchange Commission is advancing measures that would require publicly owned companies to disclose more information about their cybersecurity vulnerabilities, including data breaches.

The requirements could put pressure on companies to tighten their own security, because the SEC rules would let the public know how well firms are securing their private information.

On Tuesday, the White House launched a new ...

Read More →
0

SEC Exam Chief Plans Cybersecurity Guidance For Advisors

Posted by:

SEC Cybersecurity exams

Securities and Exchange Commission Office of Compliance Inspections and Examinations Director Drew Bowden said Wednesday he hopes to publish cybersecurity guidance for financial advisors this year.Rather than provide a list of best practices or rules, the guidance will offer a report on how prepared the financial services industry is on cybersecurity so advisors can compare it to what they are doing, the OCIE chief said.

He noted OCIE has ...

Read More →
0

Incident Response: Looking Beyond the Breach

Posted by:

data breach response

When the organizers of the just-concluded Black Hat USA conference wanted to explore incident response, they turned to Bruce Schneier, the cryptographer, author, blogger and cybersecurity expert, to make a presentation. Until recently, however, Schneier’s name wouldn’t be on most people’s list of incident response experts.

Schneier’s reputation, after all, was built on his keen observations of the influence of IT security ...

Read More →
0

How to Delete Personal Information And Other Files Permanently From Your Computer

Posted by:

Delete sensitive information from your computer
We all know that keeping personal information on our computers can be dangerous. Whether it’s your own PI, business related or possibly your partners’, spouses’ or kids you know better than to store this unencrypted on your computer.

So now you’ve found the offending data and you want to get rid of it for good. If you think that deleting it ...

Read More →
0

10 Things You Probably Didn’t Know About Identity Theft

Posted by:

Misunderstanding Abounds

Identity theft has become one of the biggest concerns for Americans. However, it is also one of the most misunderstood subjects among consumers. We are always looking for ways to protect ourselves from fraud. Credit card fraud or identity theft can turn your life upside down, especially if you have to spend time with law enforcement or incur legal charges. Its always best to prevent identity theft instead of trying to fix problems ...

Read More →
0

1/3 Of Cyber Attacks Take Hours To Detect

Posted by:

While Breach Resolution Can Take Weeks Or Longer…

Researchers polled decision makers of information security, strategy, and solution implementations at companies with 500 or more employees. They explored the security challenges commercial organizations face when confronted with security breaches across their networks.

Despite increased resource allocation designed to protect networks, a CSG Invotas and IDG Research survey finds that 82 percent of respondents report no decrease in the number of network security events or breaches last year—and more than a ...

Read More →
0

Winning Support for Data Breach Prevention

Posted by:

 Getting Buy In At The C-Level

With the plethora of data breaches in recent months, especially the high-profile Target incident, the topic of breach prevention may now be on the minds of more CEOs and boards of directors. But getting buy-in for funding still requires educating executives on the risks that could have a material impact on the business and raising awareness of critical data security issues.

“[Breach prevention] has certainly garnered attention with executives,” says ...

Read More →
0

8 Numbers Identity Thieves Want to Steal From You

Posted by:

identity theft

Know What To Protect

If you haven’t had your identity stolen or compromised yet, just wait…… It’s only a matter of time until it happens to you unless you know what you’re protecting.

The Star Wars Cantina of cybercriminals targeting your identity, healthcare, finances and privacy today might seem like a movie you’ve seen so many times you could lip sync the entire thing. Nevertheless, cybercrime and identity-related scams change ...

Read More →
0
Page 1 of 2 12
})
SEC Cybersecurity Exams