Blog

October 4, 2017
Comments [0]

The astonishing rash of disclosures of data breaches at top-tier organizations continues. Big Four accounting firm Deloitte has joined Equifax and the U.S. Securities and Exchange Commission in going public about a catastrophic loss of sensitive data.

Ironically, Deloitte a few years ago branched from its core auditing and tax services to high-end cybersecurity consulting. PricewaterhouseCoopers, another member of the Big Four...

Read More
September 20, 2017
Comments [0]

There is no mistaking that, by now, most consumers have at least a passing awareness of cyber threats.

Two other things also are true: All too many people fail to take simple steps to stay safer online; and individuals who become a victim of identity theft, in whatever form, tend to be baffled about what to do...

Read More
September 12, 2017
Comments [0]

Cyber attacks on small and midsize businesses are on the rise. To compound the problem, SMBs are becoming the favorite target of cyber attackers thanks to their lack of security protection.

The unpreparedness of small businesses makes for ...

Read More
September 12, 2017
Comments [0]

The pain has only just begun for Equifax. Last Thursday, the giant credit bureau disclosed that hackers stole personal information for 143 million of its customers, presumably mostly Americans, but also Canadians and Europeans.

In less than 24 hours, two Oregonians,...

Read More
August 16, 2017
Comments [0]

Following on the heels of the two globe-spanning ransomware worms, the HBO hack—with its distinctive blackmail component—rounds out a summer of extortion-fueled hacks and destruction and theft of valuable data at an unprecedented scale.

WannaCry and Petya raced around the planet demanding ransoms after locking up servers at hundreds of organizations. The HBO hackers pilfered 1.5 terabytes of intellectual property and business...

Read More
August 10, 2017
Comments [0]

In the past couple of years, third-party risk has grown from a topic only discussed by cybersecurity circles to a companywide concern. The tipping point may have been in 2014 when Target’s point-of-sale (POS) system was compromised, and the details of 110 million in-store customers were stolen.

How did the hackers do it? They were able to embed ...

Read More
August 9, 2017
Comments [0]

The current cybersecurity climate makes it hard not to be cautious of phishing attacks. Forget reclaiming lost family fortunes or assisting Nigerian princes, today’s phishing scams are targeted, complex and incredibly prevalent.

It feels like a new, high-profile phishing attack is getting reported every other month. In May, Google Docs users were being targeted with malicious invitations to edit fictional documents. Before that...

Read More
June 7, 2017
Comments [0]

You may now add Miley Cyrus, Emma Watson and Amanda Seyfried to the pool of celebrities who’ve been hacked and publicly humiliated. No doubt, other high-profile individuals will follow.

It’s a reminder that “high net worth individuals,” or...

Read More
May 1, 2017
Comments [0]

International business travelers take heed: Starting now, and even more so going forward, you’ll need to carefully consider how your computing devices serve as a conduit to sensitive company data.

This includes everything stored directly on your smartphones and laptops—and everything reachable from your personal computing devices that may be stored in the internet cloud.

Electronic media...

Read More
April 27, 2017
Comments [0]

There was at time 15 years ago when we fully expected the latest, coolest software to come riddled with aggravating bugs. Consumers were trained to expect that the software vendor would fix the glitches in version 1.1 or 1.2.

Software developers today remain under more pressure than ever to rush to market with the coolest functionalities. But those that do so create fresh vulnerabilities that cyber criminals pounce on to breach business networks and cause other havoc.

Factor in...

Read More

Offer 24/7 CyberScout Protection

CyberScout's partnership options help you safeguard the identity and privacy of your policyholders, customers, members and employees. Discover how a customized program can help build brand loyalty, customer retention, and quickly generate long-term recurring revenue.

Get Started