Sorry, you need to enable JavaScript to visit this website.

 

 

 

 

 

 

 

Data Breach

September 22, 2016
Comments [0]

Yahoo reported on Thursday that the account information for at least 500 million users was stolen by hackers two years ago.

Compromised user information includes names, email addresses, telephone numbers, birth dates, passwords and even security questions.

Yahoo learned of the breach this summer when hackers posted what they claimed was stolen Yahoo data to underground forums. A Yahoo...

Read More
September 15, 2016
Comments [0]

Register now to discover how your financial institution can minimize data breach threats—and attract and retain customers—with the right planning.

Combating Cyber and Breach Threats for Financial Services LeadersTuesday, Sept. 2711:00 a.m. PT, 12 p.m. MT, 1 p.m. CT, and 2:00 p.m. ET

Data breaches...

Read More
September 12, 2016
Comments [0]

The most active players in the fledgling but fast-growing cyber insurance market are hustling to differentiate themselves.

The early adopters and innovators are doing so by accelerating the promotion of value-added services—tools and systems that can help companies improve their security postures and thus reduce the likelihood of ever filing a cyber damages claim.

As more businesses look to...

Read More
August 24, 2016
Comments [0]

After years of extorting individual consumers on a global scale, ransomware  purveyors have turned their attention to much bigger fish: businesses.

For years, now, ransomware extortionists have profited handsomely from locking up the computer screens of millions of consumers with scams to sell bogus $79 antivirus cleanup services.

Now fresh intelligence from consultancy Deloitte, networking...

Read More
August 19, 2016
Comments [0]

Sometimes a glitch is more than a glitch. Sometimes, that glitch grinds much of the country to a halt. And it gets the company involved hauled in front of Congress to explain itself.

Recent airline techno-disasters at Delta and Southwest—and United last year—have made one thing clear: Systems designed to keep America moving in the air are far too fragile. Are they just too old?

...

Read More
August 19, 2016
Comments [0]

Sometimes a glitch is more than a glitch. Sometimes, that glitch grinds much of the country to a halt. And it gets the company involved hauled in front of Congress to explain itself.

Recent airline techno-disasters at Delta and Southwest—and United last year—have made one thing clear: Systems designed to keep America moving in the air are far too fragile. Are they just too old?

...

Read More
July 28, 2016
Comments [0]

In the words of President Obama, it's "fair to say this is not your typical election." Though he was speaking of the choice Americans must make between two very different candidates come November, they also apply to the role cyber security is playing in the election and the way it is shaping the conversation about data protection.

U.S. intelligence agencies have "high confidence" that the Russian government played a role in the...

Read More
July 19, 2016
Comments [0]

There is a major disconnect, on a number of levels, between information security officers ready to purchase cyber liability coverage and the insurance brokers and underwriters eager to meet that demand.

That’s the big takeaway from a new study by security think tank The SANS Institute and insurance industry researcher ...

Read More
July 18, 2016
Comments [0]

Owners of small and midsize businesses routinely take into account the risk of a fire burning down the building, or a customer or employee getting hurt on company property.

But what about exposure to botnets, data thieves, cyber scammers, hacktivists and disgruntled insiders?

Data is the new currency, and because SMBs now routinely collect, store and access sensitive and valuable data across...

Read More
June 29, 2016
Comments [0]

By Roger Yu

Most company senior executives and board members have no clue how to gauge the full scope of financial trauma engendered by a major network breach.

How does one calculate the value of lost trust of customers who take their patronage elsewhere after a well-publicized cyber attack, for instance?

Lost future sales generally are not accounted for in calculating cyber attack costs. A lack of planning for such variables potentially could cost companies...

Read More

Offer 24/7 CyberScout Protection

CyberScout's partnership options help you safeguard the identity and privacy of your policyholders, customers, members and employees. Discover how a customized program can help build brand loyalty, customer retention, and quickly generate long-term recurring revenue.

Get Started