The prevalence and constant use of web browsers makes then an ideal point of entry for malicious hackers In case the many recent posts to this blog covering cyber crimes haven’t made it clear, at this point it’s not a question of whether you’ll be attacked, but when. A new …
Military Crisis Management for Cyber Threats
U.S. Cyber Command a solid model for businesses to follow The hacks and breaches of the past several years have made clear to us that cyber crime is here to stay, and that plans to prevent and mitigate the damage from these attacks is an absolute must for crisis management. …
Jonathan Bernstein on the Sony Hack and Next Steps
Can the movie studio recover, and if so, how? The Sony Hack is an unprecedented event that could very easily become the new norm. After all, hackers have proven their ability to penetrate just about any system they want time and time again over the past couple of years, and …
IBM Study, Cyber Attacks, and Crisis Management
More data from IBM researchers on the current state of system security The past several years have seen a near-constant stream of data breaches, hacks, and other cyber-intrusions that have left individuals and organizations in some seriously sticky spots. While awareness, preparation, and responsiveness has improved significantly over those years, …
Cyber Threat – Social Login Attacks
Staying aware of threats is part of any good crisis management plan Social logins, where you use your Facebook, Twitter, Google or other social media accounts to log into apps and platforms around the web, have quickly become a norm. After all, with the mile-long list of passwords and key …
CurrentC Needs Crisis Management after Data Breach
Losing trust before you get off the ground can be devastating Mobile payment is a hot field right now, and it looks like whoever comes out as the clear favorite is going to reap serious benefits. One newcomer to the field, CurrentC, has already encountered a major hurdle in the …
Data Breach Crisis Management for Kmart
You didn’t really think we’d get through a full week without a data breach story, did you? Yesterday saw Sears Holdings Corp. announce a data breach at its Kmart stores with the statement below, posted to the Kmart website: Did you spot the element that was missing from this message? …
Crisis Management Dangers in “The Cloud”
Should you be trusting cloud storage with valuable data? Storing data in “the cloud” has become enormously popular, yet a lack of understanding about exactly what is okay to store there, and how secure cloud services are, has led to massive security threats becoming commonplace. We would even go so far …
Crisis Management Risk – Smartphone Shipped with Spyware
Data thieves find a new angle of attack The message that downloading suspicious apps can land with you a phone full of malware is finally gaining ground, but what if your phone comes straight from the factory with nasty software already installed? Well, if you ordered a Star N9500 Android …
Antivirus Maker’s Crisis Management for Data Breach
More proof that nobody is invulnerable to cyber attacks In the last Crisis Manager of 2013, we predicted cyber crises would explode this year, and explode they have. What was once a fringe crime that often went unnoticed by both victims and the media has become big business, and it …
Crisis Management Musts – Understanding Digital Security
The Internet can create serious issues for your organization, educate yourself to avoid danger If you work with the Internet a lot, and that includes pretty much all of us at this point, understanding digital security is a crisis management must. There are endless examples of trouble sprouting from a …
Adobe Needs Crisis Management as Massive Data Theft Revealed
Add this one to the list of major hacks in 2013 In early October software maker Adobe was hit by hackers, who reportedly stole some 3 million encrypted customer credit card records, along with login data. Now, the real story is coming out, and the damage is FAR higher than …
Crisis Management Musts: Plan for Cyber Attacks
It’s no longer a question of “if”, but “when” you will face an online attack Convinced your data is secure because you’re using a phrase password from your favorite book or movie, something like, “Call me Ishmael?” Think again! Ars Technica’s Dan Goodin reports: For the first time, the freely …
Crisis Management for Scary Android Security Flaw
Major threat to popular mobile operating system It doesn’t get much scarier than this. Bluebox Security claimed to have discovered a vulnerability in Android’s security model that could allow attackers to convert 99 percent of all applications into Trojan malware. Google has told ZDNet that the hole has been patched …
The Three P’s of Cyber-Survival
The cyber war is on, protect yourself now South Korea was hit by a major cyber attack Wednesday as the computer systems of two major banks, three broadcasters and others simultaneously crashed, raising suspicions that North Korea was to blame. On some computer screens, images of skulls with glowing red …