Category Archives: Data Breach

phishing scam

Post Cyber Incidents Phishing Scams Arise

In the month of July, The Identify Theft Resource Center identified 110 data breaches. Of which, over 106 million records were exposed across the financial, business, education, government, and health care sectors. Whether you were affected by these breaches or not, you are still susceptible to phishing scams targeting post breach victims. Capital One Breach […]

Read More

pii

Your Personal Information is Exposed… Again

We see headlines such as “Capital One Suffers Data Breach Affecting Over 100 Million Across America” all the time. Sadly, the more we see headlines like these, the more desensitized we are to them. We see our personal information exposed such as names, email addresses, and even social security numbers as a normal everyday occurrence. […]

Read More

NIST Cybersecurity Framework

The NIST Cybersecurity Framework 5th Anniversary

In five years, NIST has gone from being a framework to help develop an effective security program and posture, to a recognized process that has enabled successful conversations to bridge the gap between security and senior leadership. The NIST Cybersecurity Framework (CSF) was originally introduced at a time when large-scale cyber attacks (such as CryptoLocker […]

Read More

resigns

CEOs: The Cybersecurity Breach is Your Fault

As a CEO, it is your duty to grow your business and protect it from anything that could hinder its achievements and progress. Cybersecurity is no exception. It is time for CEOs to take the reins on cybersecurity, not only for the well-being of their organizations, but also for themselves. A Gartner analysis of security […]

Read More

cybersecurity business travel

Cyber Security Tips for Business Travel

Do you or your employees travel for business? You may enforce strict IT security policies in the office but are they effective outside of the office?  I know when I travel, my brain turns to mush. I am usually more concerned about where I am going rather than what Wi-Fi network my phone is connected […]

Read More

Microsoft office security

The Concerning Reality of Microsoft’s Email Security

Are you trusting Microsoft Office 365’s built in security? With data security compliances such as HIPAA, GDPR, DFARs and the risk of crippling consequences of subsequent breaches, you shouldn’t solely rely on these built in features. Within the past eight years, the use of email has grown exponentially, becoming the primary business collaboration tool. Organizations […]

Read More

data leak

Data Leak Alert: Protect Your Organization

Are you one of the 885 million consumers affected by the First American Financial data leak? Last Friday, files stored on the First American Financial company’s website (firstam.com), contained bank account numbers, bank statements, mortgage records, tax documents, wire transfer receipts Social Security numbers and photos of driver’s licenses. Information dated back to 2003 was […]

Read More

board approval

Industry Spotlight: Credit Unions – Getting the Board On-Board With Cyber Security

The fight against cyber threats continues to grow more difficult every day, particularly in the financial sector. In fact, the threat of cyber security may very well be the biggest threat to the U.S. financial system. It’s best to mitigate this risk with a complete defense-in-depth program involving threat identification, protection, detection, response and recovery. […]

Read More

data breach impact

The Top 3 Impacts of a Data Breach

We often talk about the hard costs of lost data as a result of ransom amounts, use of resources, legal fees, and regulatory fines, but these are only the short term costs. In the long term, the soft costs are more troubling. These costs include customer loss, tarnished brand reputation, and productivity loss. While soft […]

Read More

Third Party Due Diligence Could Prevent Your Next Cyber Breach

Cyber risk is often unaddressed in the due diligence process of vetting or monitoring a third party. Therefore, transfer of cyber risk is an afterthought and a common blind spot. With the ease and accessibility of outsourcing core competencies, this risk continues to be a big issue. It’s not enough to strengthen your own cybersecurity […]

Read More