Category Archives: Data Breach

Penetration Testing

Thorough penetration testing involves social engineering, vulnerability scanning, and the manual hacking of computer systems, networks, and web applications. Several regulatory compliances and standards recommend and/or REQUIRE pen tests. Some examples include PCI, SOX, HIPAA, GLBA, FISMA, NIST, DFARS etc. PCI-DSS regulations mandate both an annual and ongoing penetration testing after any system changes. SOX […]

Read More

email hyjacking

Email Hyjacking

This could happen to you You regularly handle proprietary financial information for your organization. Investors, clients, and potential partnerships trust your word and advice which you often communicate via email. You’ve recently started noticing something a bit fishy with your emails but nothing seems too concerning. Then you start to catch a couple more red […]

Read More

phishing scam

Post Cyber Incidents Phishing Scams Arise

In the month of July, The Identify Theft Resource Center identified 110 data breaches. Of which, over 106 million records were exposed across the financial, business, education, government, and health care sectors. Whether you were affected by these breaches or not, you are still susceptible to phishing scams targeting post breach victims. Capital One Breach […]

Read More

pii

Your Personal Information is Exposed… Again

We see headlines such as “Capital One Suffers Data Breach Affecting Over 100 Million Across America” all the time. Sadly, the more we see headlines like these, the more desensitized we are to them. We see our personal information exposed such as names, email addresses, and even social security numbers as a normal everyday occurrence. […]

Read More

NIST Cybersecurity Framework

The NIST Cybersecurity Framework 5th Anniversary

In five years, NIST has gone from being a framework to help develop an effective security program and posture, to a recognized process that has enabled successful conversations to bridge the gap between security and senior leadership. The NIST Cybersecurity Framework (CSF) was originally introduced at a time when large-scale cyber attacks (such as CryptoLocker […]

Read More

resigns

CEOs: The Cybersecurity Breach is Your Fault

As a CEO, it is your duty to grow your business and protect it from anything that could hinder its achievements and progress. Cybersecurity is no exception. It is time for CEOs to take the reins on cybersecurity, not only for the well-being of their organizations, but also for themselves. A Gartner analysis of security […]

Read More

cybersecurity business travel

Cyber Security Tips for Business Travel

Do you or your employees travel for business? You may enforce strict IT security policies in the office but are they effective outside of the office?  I know when I travel, my brain turns to mush. I am usually more concerned about where I am going rather than what Wi-Fi network my phone is connected […]

Read More

Microsoft office security

The Concerning Reality of Microsoft’s Email Security

Are you trusting Microsoft Office 365’s built in security? With data security compliances such as HIPAA, GDPR, DFARs and the risk of crippling consequences of subsequent breaches, you shouldn’t solely rely on these built in features. Within the past eight years, the use of email has grown exponentially, becoming the primary business collaboration tool. Organizations […]

Read More

data leak

Data Leak Alert: Protect Your Organization

Are you one of the 885 million consumers affected by the First American Financial data leak? Last Friday, files stored on the First American Financial company’s website (firstam.com), contained bank account numbers, bank statements, mortgage records, tax documents, wire transfer receipts Social Security numbers and photos of driver’s licenses. Information dated back to 2003 was […]

Read More

board approval

Industry Spotlight: Credit Unions – Getting the Board On-Board With Cyber Security

The fight against cyber threats continues to grow more difficult every day, particularly in the financial sector. In fact, the threat of cyber security may very well be the biggest threat to the U.S. financial system. It’s best to mitigate this risk with a complete defense-in-depth program involving threat identification, protection, detection, response and recovery. […]

Read More