Data Security

June 29, 2016
Comments [0]

By Roger Yu

Most company senior executives and board members have no clue how to gauge the full scope of financial trauma engendered by a major network breach.

How does one calculate the value of lost trust of customers who take their patronage elsewhere after a well-publicized cyber attack, for instance?

Lost future sales generally are not accounted for in calculating cyber attack costs. A lack of planning for such variables potentially could cost companies...

Read More
June 25, 2016
Comments [0]

How bad has the ransomware problem become? The state auditor of Ohio held a news conference because local government agencies keep falling for ransomware attacks. And a firm that tracks domain activity found a 3,500 percent increase in ransomware-related domain name registrations in the past quarter. Hackers love to cut and paste, so imitation is the surest sign that something is working.

Recall the high-profile, alarming...

Read More
June 14, 2016
Comments [0]

How prepared are you to deal with cyber threats? Is your organization’s email security sophisticated enough to detect and deflect the best spear-phishing or whaling attacks? Do you feel confident you are safe—or as safe as you can be?

The answers to these questions often are torn between your perceptions of security and the reality of it. This gap between the two exposes some major vulnerabilities, ranging from how much of an...

Read More
May 25, 2016
Comments [0]

By Roger Yu

Payroll. Customer relationship management. Employee benefits.

These are a few of the common cost-of-doing-business functions most companies must expense and which many have chosen to outsource.

You can add network security to that list. In the digital age, all companies must come to grips with rising exposures to criminal hacking; and many,...

Read More
May 25, 2016
Comments [0]

By Pierluigi Stella

The sheer idea of hacking into a network and stealing data is based on being stealthy. Hackers are really good at that.

The revelation last week that the password breach first reported by LinkedIn in 2012 was, in fact, much bigger than anyone thought, proves the point.

Related podcast:...

Read More
May 23, 2016
Comments [0]

 

Quickly, what was your LinkedIn password in 2012? OK, now think of every password you have set at every service you use and make sure that LinkedIn password isn’t reused anywhere.

If ever you needed a reminder not to reuse passwords, here it is. We knew that LinkedIn got hacked in 2012, but at the time, we thought “only” 6.5 million passwords had been taken. Now, we learn the real figure...

Read More
April 19, 2016
Comments [0]

 

By James LaDue

The internet is a strange and dangerous place, especially when it comes to your personal information. With all the hackers and scammers out there, protecting your information in cyberspace is much more of a challenge these days than simply demonstrating common sense. And you can’t just rely on your bank’s internet security measures anymore.

Cyber-thieves have now found...

Read More
April 15, 2016
Comments [0]

The only sure thing in the world of information security is that there is no such thing as a failsafe solution. It’s crucial not only to keep abreast of the latest threats out there, but to also act as though the mission is to find your way to safety from the middle of a lawless demilitarized zone that’s lousy with enemy snipers.

Sound extreme? Remember that Cold War classic “A Few Good Men” when Colonel Jessup (played by Jack...

Read More
March 27, 2016
Comments [0]

The Privacy XChange Forum just got better.

Register now for a complimentary ticket to the fourth annual privacy event of the year.

PxF4Oct. 16-18, 2016Boulders Resort & Spa

PxF4 promises exciting new speakers, including former C.I.A. employee and whistle-blower Edward Snowden, and...

Read More
March 15, 2016
Comments [0]

Data breaches at large corporations like Sony, Target and Home Depot make headlines. But small businesses are just as vulnerable.

Register now for this free webinar to learn how small businesses have become ideal targets for cyber criminals in search of financial information, consumer data, and intellectual property.

... Read More

Offer 24/7 CyberScout Protection

CyberScout's partnership options help you safeguard the identity and privacy of your policyholders, customers, members and employees. Discover how a customized program can help build brand loyalty, customer retention, and quickly generate long-term recurring revenue.

Get Started