Top Five Data Breaches of Summer 2018

Posted by:

It seems that 2.6 billion records were exposed in the first half of 2018. Just to provide context, remember that there are less than 3 times that many people alive on the planet. Obviously, those records don’t represent unique users, but it goes to show the sheer scope of the problem.

And it is an expensive problem. In the U.S. the average price tag swells to $7.91 million per breach, with an average clean up time ...

Read More →
0

“You Hacked.” Unexpected lessons from a ransomware attack on public services

Posted by:

You know it is a bad day when your computer screen blips up with this ransomware message:


“You Hacked, ALL Data Encrypted. Contact For Key (cryptom27@yandex.com)ID:681, Enter.”

But if the day is Black Friday, and your computer is part of a major US city’s municipal transit system, I think we can all agree that this constitutes a very, very, bad day indeed.

This was the ransomware message presented on hundreds of SFMTA (San Francisco’s transit agency) computer screens on Black Friday – 25 November.

The ...

Read More →
0

Three BIG security threat predictions for 2016: Make sure you are covered!

Posted by:

With many security companies pushing out their threat predictions for 2016, we thought it best to review as many as we could in order to compile a definitive list of what to look out for in this coming year.

And, as independent consultants without any direct or indirect ties to specific security providers, we are well placed to provide an product-agnostic perspective on the state of security in 2016.

More importantly, we wanted to give you expert advice on how you can ...

Read More →
0

SEC Could Pressure Companies To Tighten CyberSecurity

Posted by:

SEC data breach reportingThe Securities and Exchange Commission is advancing measures that would require publicly owned companies to disclose more information about their cybersecurity vulnerabilities, including data breaches.

The requirements could put pressure on companies to tighten their own security, because the SEC rules would let the public know how well firms are securing their private information.

On Tuesday, the White House launched a new ...

Read More →
0

SEC Exam Chief Plans Cybersecurity Guidance For Advisors

Posted by:

SEC Cybersecurity exams

Securities and Exchange Commission Office of Compliance Inspections and Examinations Director Drew Bowden said Wednesday he hopes to publish cybersecurity guidance for financial advisors this year.Rather than provide a list of best practices or rules, the guidance will offer a report on how prepared the financial services industry is on cybersecurity so advisors can compare it to what they are doing, the OCIE chief said.

He noted OCIE has ...

Read More →
0

Incident Response: Looking Beyond the Breach

Posted by:

data breach response

When the organizers of the just-concluded Black Hat USA conference wanted to explore incident response, they turned to Bruce Schneier, the cryptographer, author, blogger and cybersecurity expert, to make a presentation. Until recently, however, Schneier’s name wouldn’t be on most people’s list of incident response experts.

Schneier’s reputation, after all, was built on his keen observations of the influence of IT security ...

Read More →
0

How to Delete Personal Information And Other Files Permanently From Your Computer

Posted by:

Delete sensitive information from your computer
We all know that keeping personal information on our computers can be dangerous. Whether it’s your own PI, business related or possibly your partners’, spouses’ or kids you know better than to store this unencrypted on your computer.

So now you’ve found the offending data and you want to get rid of it for good. If you think that deleting it ...

Read More →
0

10 Things You Probably Didn’t Know About Identity Theft

Posted by:

Misunderstanding Abounds

Identity theft has become one of the biggest concerns for Americans. However, it is also one of the most misunderstood subjects among consumers. We are always looking for ways to protect ourselves from fraud. Credit card fraud or identity theft can turn your life upside down, especially if you have to spend time with law enforcement or incur legal charges. Its always best to prevent identity theft instead of trying to fix problems ...

Read More →
0

1/3 Of Cyber Attacks Take Hours To Detect

Posted by:

While Breach Resolution Can Take Weeks Or Longer…

Researchers polled decision makers of information security, strategy, and solution implementations at companies with 500 or more employees. They explored the security challenges commercial organizations face when confronted with security breaches across their networks.

Despite increased resource allocation designed to protect networks, a CSG Invotas and IDG Research survey finds that 82 percent of respondents report no decrease in the number of network security events or breaches last year—and more than a ...

Read More →
0

Winning Support for Data Breach Prevention

Posted by:

 Getting Buy In At The C-Level

With the plethora of data breaches in recent months, especially the high-profile Target incident, the topic of breach prevention may now be on the minds of more CEOs and boards of directors. But getting buy-in for funding still requires educating executives on the risks that could have a material impact on the business and raising awareness of critical data security issues.

“[Breach prevention] has certainly garnered attention with executives,” says ...

Read More →
0
Page 1 of 2 12
})
SEC Cybersecurity Exams