Data security dangers still very much present Ransomware – or software employed by hackers to lock you out of your systems until you pay up – made a major showing in 2016. A little thing called the U.S. Presidential election seemed to distract the media and we didn’t hear much …
The Reputation Impact of Data Breach
[Editor’s note: Thank you to Simon Parker of Minerva Security for sharing this guest post on how losing private data reflects on your company’s reputation.] Data breaches happen alarmingly frequently these days for a lot of reasons. Some companies are not willing to invest in the infrastructure that would make …
8 Data Security Tips for Small Businesses [Infographic]
Understanding how to keep your data secure [Editor’s note: This guest post came to us from the experts at Australia-based The Service Manager. If you have a submission you think may be a fit for our blogs we’d love to see it, contact [email protected] for more information.] Data security, among …
Data Breach Crisis Management: The Costs Are Rising
Average breach now costs $4 million Data breaches are more than just a reputation threat, they’re expensive. And that expense is rising. According to new research from IBM’s security division, the cost of a data breach has risen 29% since 2013, and now comes in at a staggering $4 million …
SEVEN MILLION Minecraft Community Accounts Exposed, 0 Informed
[Editor’s note: A big THANK YOU to colleague Phil Cogan for bringing this story to our attention! If you have a topic that might be a good fit for this blog we’d love to see it, drop an email to [email protected] any time.] Having less-than-ideal security in place to protect user …
Guest Post: Workplace Data Security and Crisis Management
[Editor’s note: This post comes to us courtesy of the University of Alabama at Birmingham’s Collat School of Business. If you have content you think would be a good fit for our blogs, email [email protected]] Steering clear of common workplace security pitfalls While data security is an increasingly crucial part …
Cardinals Caught in a Pickle after Alleged Astros Hack
Cyber crime history in the making Yesterday, the NY Times broke the story of the ongoing investigation by the F.B.I. and Justice Department prosecutors into the possible hacking of a Houston Astros internal network by St. Louis Cardinals staff. This hack, if proven, marks the first-ever cyber attack by a …
Cyber Threats 101
The time to prepare for a cyber attack is before it happens, not while you’re picking up the pieces A recent poll from the cybersecurity experts at CyberEdge returned some startling stats. A full 71% of respondents’ networks were breached in 2014, 59% saw a rise in mobile device threats, …
Hacking Wi-Fi Networks is Literally Child’s Play
It doesn’t take a hardened criminal to steal your data Public wi-fi networks are everywhere, from coffee shops to entire metro areas. They’re also astoundingly easy to hack. In an eye-opening experiment out of the UK, one security researcher turned a 7-year-old loose on a hotspot with nothing but a …
Guest Post: Cybersecurity Takes Centre Stage as a Crisis Risk
[Editor’s note: The below article, originally published in the Managing Outcomes newsletter, is an excellent look at the hot topic of cybersecurity from our colleague and frequent contributor Tony Jaques.] 2014 was a landmark year for cybersecurity, which saw a real change in reputational risk for corporations and other organisations. …
Crisis Management Risk: Your Apps Have Been Hacked
With convenience comes danger Smartphones have gone far past being a fancy means of communication. They are our bank tellers, our maps, our offices-away-from-the office, and so much more, and all of this increased functionality is made possible by the use of apps. Pretty awesome, right? Not so fast…our colleague …
Software As a Cybersecurity Risk
Are the programs you use to work leaving you vulnerable to attack? Publicly held companies are being ranked, both by stakeholders and the SEC, on their ability to prevent and withstand cyber attacks. Although most have put some form of security measures in place, the experts at Veracode say software …
Crisis Management Risk – Web Browser Flaws
The prevalence and constant use of web browsers makes then an ideal point of entry for malicious hackers In case the many recent posts to this blog covering cyber crimes haven’t made it clear, at this point it’s not a question of whether you’ll be attacked, but when. A new …
Military Crisis Management for Cyber Threats
U.S. Cyber Command a solid model for businesses to follow The hacks and breaches of the past several years have made clear to us that cyber crime is here to stay, and that plans to prevent and mitigate the damage from these attacks is an absolute must for crisis management. …
Jonathan Bernstein on the Sony Hack and Next Steps
Can the movie studio recover, and if so, how? The Sony Hack is an unprecedented event that could very easily become the new norm. After all, hackers have proven their ability to penetrate just about any system they want time and time again over the past couple of years, and …
- Page 1 of 2
- 1
- 2