[Editor’s note: In light of the 45,000+ ransomware attacks being reported today, we thought this guest post from tech writer Rick Delgado to be particularly pertinent.] 5 Essential Cyber Security Strategies You Need to Know Securing your business has taken on a whole new meaning with the different opportunities cyber thieves …
Why You Should Have a Disaster Recovery Strategy Now
[Editor’s note: This guest post comes to us courtesy of tech consultant Rick Delgado. To submit guest articles email [email protected]] In today’s technology-driven, data-intensive IT environment, a disaster recovery strategy is not an option. The Internet of Things has proliferated. It will not slow down, and artificial intelligence is gaining …
Remember Ransomware?
Data security dangers still very much present Ransomware – or software employed by hackers to lock you out of your systems until you pay up – made a major showing in 2016. A little thing called the U.S. Presidential election seemed to distract the media and we didn’t hear much …
The Reputation Impact of Data Breach
[Editor’s note: Thank you to Simon Parker of Minerva Security for sharing this guest post on how losing private data reflects on your company’s reputation.] Data breaches happen alarmingly frequently these days for a lot of reasons. Some companies are not willing to invest in the infrastructure that would make …
Why Small Businesses Should Take Security Seriously
[Editor’s note: Thank you to technology consultant Rick Delgado for contributing this guest post!] Cyber-security crises have been making headlines for a while now. Most if not all of the virtual-heists we hear of have had to do with large corporation whose millions of customers have been affected by the …
8 Data Security Tips for Small Businesses [Infographic]
Understanding how to keep your data secure [Editor’s note: This guest post came to us from the experts at Australia-based The Service Manager. If you have a submission you think may be a fit for our blogs we’d love to see it, contact [email protected] for more information.] Data security, among …
The Hidden Scope of the Data Security Crisis
Do the real numbers tell a dangerous story? According to a new report from Symantec, we’re only seeing the tip of the iceberg when it comes to the true extent of data breaches. In the report, Symantec alleges that the reported 429 million identities exposed in 2015 are but a …
Guest Post: Workplace Data Security and Crisis Management
[Editor’s note: This post comes to us courtesy of the University of Alabama at Birmingham’s Collat School of Business. If you have content you think would be a good fit for our blogs, email [email protected]] Steering clear of common workplace security pitfalls While data security is an increasingly crucial part …
Another Scary Wireless Car Hack
More evidence connectivity is outpacing security Hot on the wheels (sorry, couldn’t resist!) of the uConnect hack comes another concern-causing car finding. This time, researchers at the University of California San Diego announced their discovery of a method that allows them to to hack thousands of different vehicles from a …
Android Flaw Highlights Tech Risk
When it comes to hacks think “when,” not “if” Our smartphones are veritable treasure troves of valuable information, yet they’re also one of the least-protected devices we use on a regular basis. Hacking phones is becoming more profitable by the minute, and the number of threats appearing is directly related. …
Reputation and the Financial Sector
Identifying the biggest threat to financial firms’ reputations Reputation is your most valuable asset, and today there are more threats to reputation than ever before. One of the fastest-growing and most impactful issues is information security, and the results of the 2015 Makovsky Wall Street Reputation Study show why. According …
Information Security (or Lack Thereof)
A look at an all-too-common cause of crisis Whether it’s exposing client data or losing corporate secrets to unknown competitors, failing to secure sensitive information can quickly create a crisis. But, despite the high profile examples we’ve seen over the past couple years, an “it won’t happen to me” attitude …
Hacking Wi-Fi Networks is Literally Child’s Play
It doesn’t take a hardened criminal to steal your data Public wi-fi networks are everywhere, from coffee shops to entire metro areas. They’re also astoundingly easy to hack. In an eye-opening experiment out of the UK, one security researcher turned a 7-year-old loose on a hotspot with nothing but a …
Guest Post: Cybersecurity Takes Centre Stage as a Crisis Risk
[Editor’s note: The below article, originally published in the Managing Outcomes newsletter, is an excellent look at the hot topic of cybersecurity from our colleague and frequent contributor Tony Jaques.] 2014 was a landmark year for cybersecurity, which saw a real change in reputational risk for corporations and other organisations. …
Crisis Management Risk: Your Apps Have Been Hacked
With convenience comes danger Smartphones have gone far past being a fancy means of communication. They are our bank tellers, our maps, our offices-away-from-the office, and so much more, and all of this increased functionality is made possible by the use of apps. Pretty awesome, right? Not so fast…our colleague …
- Page 1 of 2
- 1
- 2