For those of you that have websites that process online payments (such as retail, hospitality, health care, entertainment and utilities), the Federal Bureau of Investigation (FBI) recently issued a warning about e-skimming...more
Despite the fact that security experts have emphasized the importance of cyber education and training as a preventative measure to protect against a devastating data breach, Chubb’s Third Annual Cyber Risk Survey finds that...more
Although the number of security vulnerabilities reported in the first half of 2019 have reported dropped a bit from last year, a new report by Risk Based Security states that 34 percent of the 11,092 vulnerabilities...more
It’s a busy time for colleges and universities as the fall semester starts and campuses are bustling with activity. It’s also the perfect time for cyber criminals to create mayhem for institutions of higher education with a...more
8/30/2019
/ Colleges ,
Cyber Attacks ,
Cyber Threats ,
Cybersecurity ,
Data Breach ,
Data Protection ,
Educational Institutions ,
Hackers ,
Information Technology ,
Personally Identifiable Information ,
Ransomware ,
Universities
According to Hiscox’s Third Cyber Readiness Report, which surveyed 5,400 firms in the U.S. and the E.U., cyber threats have “become the unavoidable cost of doing business today.” The Report notes that for the first time, “a...more
According to the 2019 Verizon Insider Threat Report, 20 percent of all cybersecurity incidents and 15 percent of data breaches in 2018 were caused by insiders—that is, employees or partner organizations....more
In its C-Suite Challenge 2019, The Conference Board surveyed more than 800 CEOs and some 600 other C-Suite executives around the globe, drawing primarily from the U.S., Asia, and Europe.
...more
2/1/2019
/ Call Centers ,
CEOs ,
Cyber Threats ,
Cybersecurity ,
Data Privacy ,
Drones ,
Financial Industry Regulatory Authority (FINRA) ,
FinTech ,
General Data Protection Regulation (GDPR) ,
Geolocation ,
Geological Data ,
Google ,
Telecommunications ,
Wire Transfers
In its C-Suite Challenge 2019, The Conference Board surveyed over 800 CEOs and over 600 other C-Suite executives around the globe, but primarily from the U.S., Asia, and Europe....more
For data security buffs like me, the recent McAfee® Labs Threats Report, December 2018 is, or should be, a top pick on the list. Well, maybe not for the holiday reading list. We need to be careful not to bring up the results...more
12/27/2018
/ Article III ,
Cyber Crimes ,
Cyber Threats ,
Cybersecurity ,
Data Breach ,
Data Protection ,
Driverless Cars ,
Drones ,
Experian ,
Hackers ,
Health Insurance Portability and Accountability Act (HIPAA) ,
Information Technology ,
OCR ,
Public Health ,
Risk Management ,
Smart Devices ,
Standing ,
Transportation Industry ,
Vaccinations ,
Value-Based Care ,
Vulnerability Assessments
Experian’s Data Breach Resolution group has released its Data Breach Industry Forecast 2019 Report, which provides predictions for data breaches in 2019, and outlines staggering statistics of data breaches that occurred in...more
12/20/2018
/ Cyber Crimes ,
Cyber Threats ,
Cybersecurity ,
Data Breach ,
Data Protection ,
Experian ,
Financial Services Industry ,
Hackers ,
Popular ,
Risk Management ,
Vulnerability Assessments
For data security buffs like me, the recent McAfee® Labs Threats Report, December 2018 is, or should be, a top pick on the list. Well maybe not for the holiday reading list, and we need to be careful not to bring up the...more
In data privacy and security jargon, an insider threat usually includes:
an employee who creates a security risk due to a lack of awareness or carelessness, but doesn’t mean to do...more
Darkreading.com has issued a survey entitled: Monetizing the Insider: The Growing Symbiosis of Insiders and the Dark Web which states that malicious insiders are responsible for 27 percent of all cybercrime. This statistic...more
This week the Securities and Exchange Commission (SEC) issued an investigative report that outlined cyber incidents that nine public companies had experienced, causing fraudulent losses totaling more than $100 million. The...more
10/22/2018
/ Anthem Insurance ,
Cyber Attacks ,
Cyber Threats ,
Cybersecurity ,
Data Breach ,
Data Privacy ,
Drones ,
Email ,
Facebook ,
Federal Trade Commission (FTC) ,
Hackers ,
Healthcare ,
HIPAA Breach ,
Internal Controls ,
Microsoft ,
New Legislation ,
OCR ,
Personally Identifiable Information ,
Popular ,
Securities and Exchange Commission (SEC) ,
Social Media ,
State and Local Government ,
Surveillance
The Securities and Exchange Commission (SEC) this week issued an investigative report that outlined cyber incidents that nine public companies had experienced, causing fraudulent losses totaling more than $100 million. ...more
The Department of Homeland Security (DHS) has indicated that Russian hackers targeted the energy, nuclear, aviation and critical manufacturing sectors through targeting phishing campaigns throughout 2017 and were successful....more
Wearable technology and medical devices have vulnerabilities just like anything else that is digital.
ICS-CERT recently issued an advisory about vulnerabilities in Medtronic’s MyCareLink patient heart monitors. ...more
We previously warned readers about the Locky ransomware, which is potent and designed to use phishing emails to lure users to click on links and attachments, including pdfs.
Now, researchers at Cylance have discovered...more
11/20/2017
/ Antitrust Provisions ,
Big Data ,
Colleges ,
Cyber Attacks ,
Cyber Crimes ,
Cyber Threats ,
Cybersecurity ,
Data Breach ,
Drones ,
Educational Institutions ,
Email ,
Hackers ,
Information Technology ,
Malware ,
Personally Identifiable Information ,
Ransomware ,
Universities ,
Unmanned Aircraft Systems
Security researchers this week have found a new vulnerability that affects Wi-Fi Protected Access II, also known as WPA2, which is the security protocol used by many wireless networks. The vulnerability, Key Reinstallation...more
10/24/2017
/ Amazon Marketplace ,
Biometric Information ,
Biometric Information Privacy Act ,
Cyber Threats ,
Cybersecurity ,
Data Breach ,
Data Collection ,
Drones ,
Electronically Stored Information ,
Email ,
Extraterritoriality Rules ,
Hackers ,
Hyatt ,
Microsoft ,
Mobile Devices ,
Network Security ,
Personal Data ,
Privacy Concerns ,
Public Wireless Networks ,
Risk Management ,
SCOTUS ,
Stored Communications Act ,
US-CERT ,
Vulnerability Assessments ,
Wifi ,
Wireless Technology
The Federal Trade Commission (FTC) has concentrated on small businesses this year with the launch of www.FTC.gov/SmallBusiness , which provides data security awareness information to small businesses. The site includes...more
Hackers working on behalf of the Iranian government have been targeting the aviation and petrochemical industries in the United States, Saudi Arabia, and South Korean since 2013, according to a report released by FireEye...more
On the heels of the WannaCry ransomware attack last month, a new ransomware variant, Petya, hit organizations around the world on Tuesday and stopped them in their tracks—including a major law firm. This keeps us up at night...more
If you have a daughter in K-12 who is in the Girl Scouts, check out the fact that they can now earn cybersecurity badges if they demonstrate a mastery of Internet security. Brilliant! What a great way to get girls interested...more
On May 11, 2017, The American Bar Association (ABA) updated its 1999 opinion regarding lawyers’ use of email for communication. Although many state bar associations have issued opinions on electronic communications and the...more
We have read multiple reports on WannaCry and if you are reading this and don’t know what WannaCry is, Google it for the background story. The clear message is this is not the last major attack we will see, and future attacks...more
5/19/2017
/ Cyber Attacks ,
Cyber Threats ,
Cybersecurity ,
Data Protection ,
Electronic Protected Health Information (ePHI) ,
FBI ,
Hackers ,
Health Care Providers ,
Malware ,
Personally Identifiable Information ,
Phishing Scams ,
Ransomware ,
Risk Management ,
US-CERT