DRS - Client Newsletter

August 16, 2017
Comments [0]

Following on the heels of the two globe-spanning ransomware worms, the HBO hack—with its distinctive blackmail component—rounds out a summer of extortion-fueled hacks and destruction and theft of valuable data at an unprecedented scale.

WannaCry and Petya raced around the planet demanding ransoms after locking up servers at hundreds of organizations. The HBO hackers pilfered 1.5 terabytes of intellectual property and business...

Read More
August 9, 2017
Comments [0]

The current cybersecurity climate makes it hard not to be cautious of phishing attacks. Forget reclaiming lost family fortunes or assisting Nigerian princes, today’s phishing scams are targeted, complex and incredibly prevalent.

It feels like a new, high-profile phishing attack is getting reported every other month. In May, Google Docs users were being targeted with malicious invitations to edit fictional documents. Before that...

Read More
August 7, 2017
Comments [0]

If you work in Maine, Arizona, Texas or Alabama, you have a greater chance of malware encounters than in other states. Researchers with Malwarebytes found that geographic location matters when it comes to who gets targeted for malware attacks. These states have a higher rate of industries most often targeted for malware, including aerospace, automotive, health care, technology and oil and gas.

What’s more, geographic location...

Read More
July 27, 2017
Comments [0]

Consumers face a grim reality when it comes to securing personal information. In the past year alone, 1.4 billion records were lost or stolen in data breaches.

Yet attempts to help become noise. Every day your customers are bombarded with news about everything from weak passwords to email scams and data breaches. They’re told their data is at risk wherever they share information. But are they really listening?

... Read More
July 24, 2017
Comments [0]

Medical devices, such as such as pacemakers, insulin pumps and defibrillators, could become lethal in the hands of a hacker tampering with them remotely.

 A new study that shows medical devices—and patients—are vulnerable to cyber attacks is a wake-up call for manufacturers, according to a Silicon Valley software company that sponsored the study.

“Device...

Read More
July 20, 2017
Comments [0]

What happened?

A new ransomware attack created computer chaos worldwide—though primarily in Europe —on June 27. The outbreak, dubbed both GoldenEye and Petya by researchers, is being compared to WannaCry. While antivirus firms and IT departments struggle to get the outbreak under control, there’s still some debate about how it works and how it spreads. But in some ways, the virus is even more powerful, and more nasty, than WannaCry.

The list of victims is...

Read More
July 18, 2017
Comments [0]

The countdown has begun. In less than a year, tough new rules on data protection will come into effect for the European Union. For the first time, companies will be required to notify regulatory authorities, and potentially consumers, in the event of a significant cyber breach.

In elevating the rights of consumers, the EU General Data Protection Regulation (GDPR) represents a sea change in how companies will have to operate—and...

Read More
July 15, 2017
Comments [0]

The DocuSign malware attack that occurred in mid-May is noteworthy because it highlights a go-to tactic popular with cyber criminals at the moment: account takeovers.

Attackers will first steal email data or credentials and then use them to launch highly targeted phishing campaigns. The one-two punch targets anyone with an email address and is becoming increasingly common.

DocuSign confirmed...

Read More
June 28, 2017
Comments [0]

In today’s connected world, cyber crime seems to be everywhere—at home, at work and in the devices we carry with us around the clock. Information security threats are more complex, widespread and challenging to address than ever before. And their speed has increased, as new vulnerabilities are discovered and exploited on a daily basis. Organizations and government agencies of all sizes are under attack, putting the personal information of millions of people at...

Read More
June 15, 2017
Comments [0]

Your policyholders may not even be aware that their networks are part of the Internet of Things. All it takes is adding any kind of smart device that connects to the internet, such as a baby monitor, TV, virtual assistant, thermostat, security camera or any type of appliance, to their home network. These devices add convenience to our lives—but they are also a convenient way for hackers to gain access to our networks and personal information.

... Read More

Offer 24/7 CyberScout Protection

CyberScout's partnership options help you safeguard the identity and privacy of your policyholders, customers, members and employees. Discover how a customized program can help build brand loyalty, customer retention, and quickly generate long-term recurring revenue.

Get Started