Could the HummingBad hack create problems for your organization? There is currently an epidemic of Android device hacks, with the largest number coming from a highly organized Chinese cybercrime group that effectively controls some 85 million mobile devices around the world. This organization, which operates as a division of Chinese …
Dell Leaves the Door Open for Dirty Work
A partial response leaves plenty of room for problems What happens when a supposedly trusted piece of software creates a major vulnerability in the systems on which it’s installed? Is the software’s publisher responsible? And, if so, what actions should they take? Over the weekend details emerged about the dangers …
Cyber Threats 101
The time to prepare for a cyber attack is before it happens, not while you’re picking up the pieces A recent poll from the cybersecurity experts at CyberEdge returned some startling stats. A full 71% of respondents’ networks were breached in 2014, 59% saw a rise in mobile device threats, …
Hacking Wi-Fi Networks is Literally Child’s Play
It doesn’t take a hardened criminal to steal your data Public wi-fi networks are everywhere, from coffee shops to entire metro areas. They’re also astoundingly easy to hack. In an eye-opening experiment out of the UK, one security researcher turned a 7-year-old loose on a hotspot with nothing but a …
IBM Study, Cyber Attacks, and Crisis Management
More data from IBM researchers on the current state of system security The past several years have seen a near-constant stream of data breaches, hacks, and other cyber-intrusions that have left individuals and organizations in some seriously sticky spots. While awareness, preparation, and responsiveness has improved significantly over those years, …
Sony Hack – Proof of the Need to Prepare for Cyber Attacks
Does your crisis management plan include the possibility of a devastating hack? The cyberattack that crippled Sony Pictures, led to theft of confidential data and leak of movies on the internet would have challenged almost any cyber security measures, the US Federal Bureau of Investigation (FBI) has said. The FBI’s …
Analyzing P.F. Chang’s Crisis Management for Data Breach
Was the popular chain’s crisis management a four-star effort? The data breach at P.F. Chang’s came to light in mid-June of this year, with the organization claiming to have learned of the situation June 10. Crisis management started out in troubled waters when a massive number of news organizations and …
Crisis Management Musts: Plan for Cyber Attacks
It’s no longer a question of “if”, but “when” you will face an online attack Convinced your data is secure because you’re using a phrase password from your favorite book or movie, something like, “Call me Ishmael?” Think again! Ars Technica’s Dan Goodin reports: For the first time, the freely …
The Three P’s of Cyber-Survival
The cyber war is on, protect yourself now South Korea was hit by a major cyber attack Wednesday as the computer systems of two major banks, three broadcasters and others simultaneously crashed, raising suspicions that North Korea was to blame. On some computer screens, images of skulls with glowing red …
Crisis Management Tips After a Network or Computer Hack
Editor’s Note: The following guest article by John Dayton explains in detail how to protect your business from the very real dangers of the Internet. The events of the past several years have left no doubt as to the necessity of having a clean and secure network. If you’ve got …