Data Security

August 24, 2016
Comments [0]

After years of extorting individual consumers on a global scale, ransomware  purveyors have turned their attention to much bigger fish: businesses.

For years, now, ransomware extortionists have profited handsomely from locking up the computer screens of millions of consumers with scams to sell bogus $79 antivirus cleanup services.

Now fresh intelligence from consultancy Deloitte, networking...

Read More
August 23, 2016
Comments [0]

By Travis Smith

Ransomware is becoming one of the most profitable areas of cyber crime.

In the past, cyber criminals would steal data, and then re-sell it. With ransomware, they block access to an individual or organization’s data by encrypting it, then selling the data’s owner a decryption key to regain access.

And with the rise of hard-to-trace currency,...

Read More
August 21, 2016
Comments [0]

A company’s customer information is an asset, although it’s probably not a line item on its balance sheet. It may be sold during the sale of the business, during a merger, or in a bankruptcy proceeding. However, its sale may be limited by the company’s website privacy notice.

A website privacy notice announces to the world how your organization will collect, receive and use information provided by customers. It also may...

Read More
August 19, 2016
Comments [0]

Sometimes a glitch is more than a glitch. Sometimes, that glitch grinds much of the country to a halt. And it gets the company involved hauled in front of Congress to explain itself.

Recent airline techno-disasters at Delta and Southwest—and United last year—have made one thing clear: Systems designed to keep America moving in the air are far too fragile. Are they just too old?

...

Read More
August 19, 2016
Comments [0]

Sometimes a glitch is more than a glitch. Sometimes, that glitch grinds much of the country to a halt. And it gets the company involved hauled in front of Congress to explain itself.

Recent airline techno-disasters at Delta and Southwest—and United last year—have made one thing clear: Systems designed to keep America moving in the air are far too fragile. Are they just too old?

...

Read More
August 18, 2016
Comments [0]

 

Pick a subject, any subject, and there are myths and pure nonsense that someone will buy into.

Birds will die if they eat the uncooked rice flung at newlyweds. (Nope) If you eat Mentos and drink Diet Coke simultaneously your stomach will explode. (Hardly) You only have one credit score. (Wrong) Napoleon was short. (At 5’ 6”, his height was... Read More
July 28, 2016
Comments [0]

In the words of President Obama, it's "fair to say this is not your typical election." Though he was speaking of the choice Americans must make between two very different candidates come November, they also apply to the role cyber security is playing in the election and the way it is shaping the conversation about data protection.

U.S. intelligence agencies have "high confidence" that the Russian government played a role in the...

Read More
July 19, 2016
Comments [0]

There is a major disconnect, on a number of levels, between information security officers ready to purchase cyber liability coverage and the insurance brokers and underwriters eager to meet that demand.

That’s the big takeaway from a new study by security think tank The SANS Institute and insurance industry researcher ...

Read More
July 18, 2016
Comments [0]

Owners of small and midsize businesses routinely take into account the risk of a fire burning down the building, or a customer or employee getting hurt on company property.

But what about exposure to botnets, data thieves, cyber scammers, hacktivists and disgruntled insiders?

Data is the new currency, and because SMBs now routinely collect, store and access sensitive and valuable data across...

Read More
July 5, 2016
Comments [0]

By Roger Yu

In July 2015, a hacker who goes by the name of Phineas Fisher breached an Italian technology company that, ironically, sells spying and hacking software tools.

Fisher exfiltrated more than 400 gigabytes from the company, called Hacking Team, and declared that his motive was to stop its “abuses against human rights.”

“That’s the beauty and...

Read More

Offer 24/7 CyberScout Protection

CyberScout's partnership options help you safeguard the identity and privacy of your policyholders, customers, members and employees. Discover how a customized program can help build brand loyalty, customer retention, and quickly generate long-term recurring revenue.

Get Started