Advanced Threats

March 27, 2016
Comments [0]

Financial institutions (FIs) are prime targets for attacks – they hold an enormous amount of business information, customer financial data, and other forms of PII.  FIs should consider working with a consultant to perform a vulnerability assessment to find potential exposure points in systems, software, and procedures.

The purpose of Vulnerability Assessment (VA) is to enable the enterprise to be aware of gaps in its IT security that an attacker could exploit in order to:

Steal or... Read More
July 14, 2015
Comments [0]

By Byron Acohido, ThirdCertainty

Army National Guard members should check their credit reports after a contract employee unintentionally transferred personnel files to an unapproved data center. Compromised data includes soldiers’ names, Social Security numbers, dates of birth and home addresses. “All current and former Army National Guard members since 2004 could be affected by this breach,” the National Guard Bureau’s Maj. Earl Brown said. The Pentagon did not...

Read More
May 29, 2015
Comments [0]

By Byron Acohido, ThirdCertainty

In 2013, health care provider Cottage Health System discovered that security on a server was disabled, leaving thousands of patients’ files potentially exposed, including names, addresses, dates of birth and, in a few cases, a diagnosis, lab results and procedures performed. Cottage was sued, along with inSync, a company responsible for securing the records. The health care provider had insurance to cover a data breach, but insurer...

Read More
May 18, 2015
Comments [0]

By Byron Acohido, ThirdCertainty

Who’s flying this thing? Cybersecurity researcher Chris Roberts said he caused a plane’s engine to climb after hacking its software, according to a court document. Roberts was questioned by the FBI after he tweeted that he was probing systems on a United Airlines flight on which he was a passenger. He has not been charged with a crime, although United banned him from its planes. FBI agent Mark S. Hurley wrote in a...

Read More
April 27, 2015
Comments [0]

By Byron Acohido, ThirdCertainty

Made to measure: The next judicial frontier in security breach exposure may be from commercial claims. Although a few high-profile consumer cases have settled, there is no single national law on data-breach issues, and courts have been reluctant to impose liability. However, commercial liability disputes are now going to court, and nearly every commercial agreement has risk-allocation language in it, giving a judge a...

Read More

Offer 24/7 CyberScout Protection

CyberScout's partnership options help you safeguard the identity and privacy of your policyholders, customers, members and employees. Discover how a customized program can help build brand loyalty, customer retention, and quickly generate long-term recurring revenue.

Get Started