More proof that nobody is invulnerable to cyber attacks In the last Crisis Manager of 2013, we predicted cyber crises would explode this year, and explode they have. What was once a fringe crime that often went unnoticed by both victims and the media has become big business, and it …
Car Service Hack No Fender Bender
Improperly stored private information leads to a heck of a crisis Hackers who broke into the Corporate Car Online servers must’ve felt like it was Christmas morning when they came across a TEXT file listing everything from credit card numbers and private flight numbers to personal preferences and records of …
Crisis Management Musts: Plan for Cyber Attacks
It’s no longer a question of “if”, but “when” you will face an online attack Convinced your data is secure because you’re using a phrase password from your favorite book or movie, something like, “Call me Ishmael?” Think again! Ars Technica’s Dan Goodin reports: For the first time, the freely …
Crisis Management for Scary Android Security Flaw
Major threat to popular mobile operating system It doesn’t get much scarier than this. Bluebox Security claimed to have discovered a vulnerability in Android’s security model that could allow attackers to convert 99 percent of all applications into Trojan malware. Google has told ZDNet that the hole has been patched …
Twitter Finally Talks Crisis Management
Social media crisis management advice straight from the horse’s mouth After the umpteenth Twitter hack of recent memory, in which a false report of explosions in the White House going out from the official Associated Press account actually caused the stock market to dip, the big blue bird is finally …
The Three P’s of Cyber-Survival
The cyber war is on, protect yourself now South Korea was hit by a major cyber attack Wednesday as the computer systems of two major banks, three broadcasters and others simultaneously crashed, raising suspicions that North Korea was to blame. On some computer screens, images of skulls with glowing red …
Crisis Management & Cyber War
Defend your virtual borders We recently wrote on the NY Times Hacking and what it means to you, but the latest news from the world of cyber-threats makes that attack look like small potatoes. In a groundbreaking move, U.S. computer security firm Mandiant released a 60-page account of activities conducted …
Crisis Management Tips After a Network or Computer Hack
Editor’s Note: The following guest article by John Dayton explains in detail how to protect your business from the very real dangers of the Internet. The events of the past several years have left no doubt as to the necessity of having a clean and secure network. If you’ve got …
- Page 2 of 2
- 1
- 2