Cybersecurity

March 16, 2018
Comments [0]

The New York Times reported this week on a hacking attempt at a petrochemical plant in Saudi Arabia last August that sought to physically sabotage the facilities and trigger an explosion. This represents a potentially alarming new trend in cyber attacks where the goal isn’t to steal information or gain control of a system, but rather to cause actual damage to people and property.

Utilizing hacking as a means of industrial sabotage isn’t necessarily new; the...

Read More
March 15, 2018
Comments [0]

Researchers at Ben-Gurion University of the Negev made a startling discovery that may change the way cybersecurity is handled in the future. One standard precaution to safeguard data is to store it on an air-gapped device. That’s IT-speak for a machine that is never connected to the Internet or any other machine or network that’s connected to it.

The same team at Ben-Gurion University has made it their business to...

Read More
March 9, 2018
Comments [0]

Unless you live in a pineapple under the sea with a talking sponge, you’re probably familiar with the never-ending parade of cute animal pictures sent by text and email—friend to friend, email list to subscriber—and everywhere you look on social media. Hackers are counting on that.

You’re no fool. You keep current on the news—specifically with regard to cyber security. You’ve seen the...

Read More
March 7, 2018
Comments [0]

new report reveals a stunning level of apathy about cybersecurity among businesses in five nations under continuous attack by ...

Read More
March 1, 2018
Comments [0]

The data breach archive site HaveIBeenPwned.com just added records from 2,844 data breaches, providing users with one of the most up-to-date resources to check the security of their accounts. The site, operated and updated by Troy Hunt, allows visitors to enter either an email address or a login name check if there information has been compromised in any of the breaches in the site’s database.

As Hunt stated on his personal...

Read More
February 23, 2018
Comments [0]

The latest deployment of Russian botnets directed at American politics was truly stunning. It happened via social media. One can only hope that it will notch up the urgency for government and businesses to address the serious threat that botnets have become.

I...

Read More
November 3, 2017
Comments [0]

In the wake of the Equifax breach, many consumers are still unprepared for fraud and searching for identity theft protection—a challenging endeavor considering the many options available.

To meet demand, CyberScout has created CyberScout HQ, an online...

Read More
November 2, 2017
Comments [0]

Cyber security took the hot seat at the fifth annual Privacy XChange Forum, where industry leaders gather to set the privacy agenda for the year.

More than 150 delegates came together in Lake Las Vegas to participate in sessions with some of the most influential global experts on cyber crime, including:

... Read More
October 4, 2017
Comments [0]

The astonishing rash of disclosures of data breaches at top-tier organizations continues. Big Four accounting firm Deloitte has joined Equifax and the U.S. Securities and Exchange Commission in going public about a catastrophic loss of sensitive data.

Ironically, Deloitte a few years ago branched from its core auditing and tax services to high-end cybersecurity consulting. PricewaterhouseCoopers, another member of the Big Four...

Read More
October 1, 2017
Comments [0]

Remember the federal Cybersecurity Information Sharing Act (CISA)? It was a law passed less than two years ago, charged with improving cybersecurity in the United States through enhanced sharing of information about cybersecurity threats between and among the government and companies.

... Read More

Offer 24/7 CyberScout Protection

CyberScout's partnership options help you safeguard the identity and privacy of your policyholders, customers, members and employees. Discover how a customized program can help build brand loyalty, customer retention, and quickly generate long-term recurring revenue.

Get Started