By: John Cleary, Shareholder, and Kayleigh Shuler, Associate, Polsinelli PC, Tech Transactions and Data Privacy Practice Group Recent years have seen companies large and small continue to grapple with the much-feared cyber incident. Yet surprisingly few have meaningful and up-to-date incident response plans (IRPs) in place to manage and …
Educate Your Employees to Avoid Data Breach
If you haven’t taught staff how to avoid an IT crisis you’re asking to have one Nearly 70% of the data protection and privacy professionals surveyed for a recent Managing Insider Risk through Training & Culture report said their employees are the weakest link in efforts to keep information secure. Hackers have …
Data Breach Crisis Management: The Costs Are Rising
Average breach now costs $4 million Data breaches are more than just a reputation threat, they’re expensive. And that expense is rising. According to new research from IBM’s security division, the cost of a data breach has risen 29% since 2013, and now comes in at a staggering $4 million …
Hollywood Hospital in Crisis as Network Held Hostage
Examining crisis management for an unprecedented ransomware attack Our last post discussed power grid hacks and the potential they hold to wreak havoc, but what about a real live hack that’s happening now? According to reports, Hollywood Presbyterian Medical center has been locked out of its own computer network for …
The Climbing Cost of Data Breaches
Coping with a now-common crisis is more pricey than ever Whether you’re prepared or not, you will spend money and lose reputation when your data is exposed. The question is, will it be the minimum you could have paid, or will you join the ranks of those helping to push …
Hacking Wi-Fi Networks is Literally Child’s Play
It doesn’t take a hardened criminal to steal your data Public wi-fi networks are everywhere, from coffee shops to entire metro areas. They’re also astoundingly easy to hack. In an eye-opening experiment out of the UK, one security researcher turned a 7-year-old loose on a hotspot with nothing but a …
Guest Post: Cybersecurity Takes Centre Stage as a Crisis Risk
[Editor’s note: The below article, originally published in the Managing Outcomes newsletter, is an excellent look at the hot topic of cybersecurity from our colleague and frequent contributor Tony Jaques.] 2014 was a landmark year for cybersecurity, which saw a real change in reputational risk for corporations and other organisations. …
Crisis Management Risk: Your Apps Have Been Hacked
With convenience comes danger Smartphones have gone far past being a fancy means of communication. They are our bank tellers, our maps, our offices-away-from-the office, and so much more, and all of this increased functionality is made possible by the use of apps. Pretty awesome, right? Not so fast…our colleague …
Software As a Cybersecurity Risk
Are the programs you use to work leaving you vulnerable to attack? Publicly held companies are being ranked, both by stakeholders and the SEC, on their ability to prevent and withstand cyber attacks. Although most have put some form of security measures in place, the experts at Veracode say software …
Crisis Management Risk – Web Browser Flaws
The prevalence and constant use of web browsers makes then an ideal point of entry for malicious hackers In case the many recent posts to this blog covering cyber crimes haven’t made it clear, at this point it’s not a question of whether you’ll be attacked, but when. A new …
Military Crisis Management for Cyber Threats
U.S. Cyber Command a solid model for businesses to follow The hacks and breaches of the past several years have made clear to us that cyber crime is here to stay, and that plans to prevent and mitigate the damage from these attacks is an absolute must for crisis management. …
Jonathan Bernstein on the Sony Hack and Next Steps
Can the movie studio recover, and if so, how? The Sony Hack is an unprecedented event that could very easily become the new norm. After all, hackers have proven their ability to penetrate just about any system they want time and time again over the past couple of years, and …
IBM Study, Cyber Attacks, and Crisis Management
More data from IBM researchers on the current state of system security The past several years have seen a near-constant stream of data breaches, hacks, and other cyber-intrusions that have left individuals and organizations in some seriously sticky spots. While awareness, preparation, and responsiveness has improved significantly over those years, …
Sony Hack – Proof of the Need to Prepare for Cyber Attacks
Does your crisis management plan include the possibility of a devastating hack? The cyberattack that crippled Sony Pictures, led to theft of confidential data and leak of movies on the internet would have challenged almost any cyber security measures, the US Federal Bureau of Investigation (FBI) has said. The FBI’s …
Cyber Threat – Social Login Attacks
Staying aware of threats is part of any good crisis management plan Social logins, where you use your Facebook, Twitter, Google or other social media accounts to log into apps and platforms around the web, have quickly become a norm. After all, with the mile-long list of passwords and key …
- Page 1 of 2
- 1
- 2