History Matters: Cyber Attacks from the 1970s

History Matters: Cyber Attacks from the 1970s

It all began circa 1957, when a seven-year-old boy named Joe Engressia stumbled upon what would one day become a widespread threat to the phone system. When Engressia whistled into his telephone with perfect pitch at a frequency of 2600 Hz, the automatic switch disconnected the line from one end, leaving the other end wide open to call long-distance free of charge.

Read More

Will Nations Make an Effort to Establish Cyber Warfare Rules?

Will Nations Make an Effort to Establish Cyber Warfare Rules?

Years ago, most developed nations agreed to establish and follow a basic rule set when it comes to warfare: no chemical weapons, no torture, and no civilian targets. However, as tactics have turned from the battlefield to the digital plane, no such boundaries exist in cyber space. In February of this year, Antonio Guterres, Secretary of the United Nations, put out a call for the development of cyber warfare rules. But with many countries failing to even acknowledge their part in digital attacks, is the establishment of cyber warfare guidelines a pie-in-the-sky idea?

Read More

What’s Your Policy: Does Your Company Need Cyber Risk Insurance?

What’s Your Policy: Does Your Company Need Cyber Risk Insurance?

The risk of a cybersecurity breach seems to increase daily, with companies large and small falling victim to hacks and attacks. In this threat landscape, many businesses have invested in cyber risk insurance to help mitigate the cost of a future attack. Also known as cyber insurance and cybersecurity insurance, these plans help organizations offset the expense of a breach or other security incident.

Read More

3 Foolproof Tips to Securely Complete Online Transactions

3 Foolproof Tips to Securely Complete Online Transactions

Most users think they’re savvy enough to shop securely online, but even the most security-minded and Internet-knowledgeable shoppers have been duped when making business purchases. Wise users need to overcome their over-confidence and brush up on online shopping best practices to avoid getting taken by a suave scammer.

Read More

5 Ways to Improve Your Cybersecurity Posture in 2019

5 Ways to Improve Your Cybersecurity Posture in 2019

On average, a ransomware attack costs a company $5 million, resulting in system downtime and productivity loss. There has also been a noticeable increase in the reach of compliance requirements. With the cost of cyber-attacks skyrocketing, it’s critical to re-examine how cybersecurity resources are being allocated. These 2019 trends build upon classic security best practices with a focus on next-generation implementation, adoption, and technologies.

Read More

Why Most Companies Don’t Have Control Over Password Security

Why Most Companies Don’t Have Control Over Password Security

Many people have developed a psychological picture of what a cyber-attack consists of. There’s a tendency to assume a complex, thrilling attack is executed by highly-technical individuals who have penetrated a network to access ironclad sensitive data. The reality, however, is much different.

Read More

7 Commonly Neglected Security Tasks: DMARC, DNS calls, and More

7 Commonly Neglected Security Tasks: DMARC, DNS calls, and More

In this age of digital transformation, IT staff are under incredible pressure to keep up with the breakneck speed of new technology adoption, implementation, and management while trying to maintain usability, productivity, and efficiency. With this reality, something has got to give, and oftentimes what falls off the radar are security tasks.

Read More

Why Users Should Never Auto-fill Forms: Browser Exploit Overview

Why Users Should Never Auto-fill Forms: Browser Exploit Overview

Life is hectic. As a result, we all look for ways to eliminate inconvenience, ease our stress levels, and save precious time. However, some comforts might come at too high of a price. Unfortunately, the auto-fill function on your browser might be a more of a risky convenience than most people realize. For years, security insiders have argued the dangers of the auto-fill function: the handy tool that automatically provides your name, address, phone number, and such for web page forms. It turns out, they are right.

Read More

Fixing the People Problem: Why Security Awareness Should Come First

Fixing the People Problem: Why Security Awareness Should Come First

It happens all too often. Imagine a Human Resources (HR) assistant receives an email from the CFO requesting an update to the companies account and routing number. The email appears to be legitimate and the diligent employee rushes to handle the CFOs request only to discover later it was a phishing email. These types of social engineering attacks have become increasingly sophisticated and difficult to detect. So what are your employees supposed to do?

Read More

Understanding HIPAA, the Trusted Exchange Framework, and Cybersecurity

Understanding HIPAA, the Trusted Exchange Framework, and Cybersecurity

Healthcare data is becoming a more and more common target for cyberattacks. Forrester Research warned a year ago that “healthcare breaches will become as large and common as retail breaches,” further predicting the Anthem breach that reached 80 million patients as a commonplace occurrence in the future. In this environment, organizations that handle sensitive health data are struggling to balance the need for better collaboration and record-keeping among trusted partners with the need to maintain strong security practices and meet compliance regulations.

Read More

IoT, Medical Devices, and Cybersecurity Concerns

IoT, Medical Devices, and Cybersecurity Concerns

Not so long ago, medical devices required only physical security considerations—only those who had access to the device could access the device’s data. However, through the Internet of Things (IoT), medical devices’ connectivity to the cloud has put them in the cross-hairs of cyber attackers.

Read More

6 Common Ways to Compromise A Business Credit Card

6 Common Ways to Compromise A Business Credit Card

A recent report from Nielson predicts credit card fraud will result in more than $31 billion in losses by 2020. And, e-commerce fraud attacks increased by more than 30% from 2016 to 2017, according to credit reporting agency Experian. So how are attackers getting away with fraud and how can you protect your business credit cards?

Read More

Selling a Social Engineering Attack

Selling a Social Engineering Attack

Social engineering techniques are not only becoming more common but also more sophisticated. Attackers seem to be taking notes from Marketing 101, ensuring that their lures strike a chord with their victims with emails that include customized messages with very official looking logos and layouts, fraudulent phone calls that cite actual employee names and titles, and even well-rehearsed seemingly innocuous facility access attempts.

Read More

How to Improve PHI Compliance Without Alienating Patients

How to Improve PHI Compliance Without Alienating Patients

Securing electronic personal health information (ePHI) to maintain Health Insurance Portability and Accountability Act (HIPAA) and other regulatory compliance can be a challenging task. Doing so while ensuring patients feel welcome and confident in your organization’s data security practices is even more challenging.

Read More

Why Identity Governance Should Guide Access Management Decisions

Why Identity Governance Should Guide Access Management Decisions

Highly public and embarrassing data breaches have made access control and security top of mind for CIOs and consumers alike. This security-conscious mindset has put identity governance in the spotlight. This emerging approach enables business managers to treat access control as a security check to better protect ...

Read More