A recent letter drafted by the Financial Services Roundtable (FSR) and sent to financial services companies promotes a risk-based cybersecurity approach. Noting the diversity of institutions, the FSR proposes moving away from imposing rigid requirements on all firms; and instead, holding individual firms accountable for customizing cybersecurity programs that align with their risk profile.Details
We have a term in our household that when any item with the thought to be ‘done with’, and is on its way to the trash is prefixed with term ‘Garbage’. While it’s not the most elegant term, it has stuck with most items. One of the best examples is when Garlic Bread gets a ‘little’ burnt. On its way to the trash, it usually gets intercepted by the men in the house and is lovingly referred to as Garbage Bread.Have an old Server? Is it a Garbage Server? Don’t throw it away just yet.Details
2017 was expected to be the year when Internet of Things would be the favorite prey for hackers, only for all the right reasons. The expectation was put forward by researchers and smart home analysts from around the world that by 2020, consumers and businesses would integrate as many as 50 billion smart home devices in their homes and offices. While smart devices are a great way to automate daily chores, they also make consumers vulnerable to attacks and infiltrations.Details
It is safe to say that most people from eleven to eighty have a smartphone. However, most of these users are unaware of a simple fact: your smartphone is far more vulnerable than most of us think. The reasons are many; this blog will focus on some of the reasons.Details
If you were still in any doubts about your responsibility for keeping your online data safe, the recent crisis enveloping the NHS and its lack of defense against cyber attacks in 2017 should destroy them.Details
Today, companies are able to perform tasks that were previously impossible, thanks to the technologies that create, store and examine large sets of data. But, this benefit has its own sets of risk, precisely from a security standpoint.Details
It appears there’s another global ransomware outbreak occurring that’s effecting banks, telco’s, and critical infrastructure.
There are multiple countries in Europe stating they’re infected with confirmed reports coming in from UK, Spain, Ireland, Russia and Ukraine.Details
Most small and midsize businesses (SMBs) consider focusing on cybersecurity a lower priority than financial success, but that’s a mistake. Without the right security in place, many SMBs may no longer have a business to worry about.Details
When most people think of business innovation, the first thing they think about is coming up with new products and services. However, innovation can apply to a number of areas in the business world, including security. Some of the most innovative companies use their thinking to boost their security with new and creative ideas. Here are a few things to learn from innovative examples:Details
Over the last twenty years, wireless has gone from a novelty to a necessity. Providing a wireless network is what encourages worker mobility as well as mobility of thought. But the challenges the wireless network present are daunting. Implementing security properly is paramount when designing and implementing a wireless LAN (WLAN). An organization needs to determine how to address Guest and BYOD postures while keeping known devices and users segregated from the rest of population.Details
With many individuals information being compromised both physical and logical information security is on the forefront of many people and businesses minds. The fear of being on CNN headline news and or individuals private information being forward facing of the internet for everyone in the world to see is concerning and real.Details
The back-to-back WannaCry and Adylkuzz outbreaks in mid-May mark a turning point on the cybersecurity landscape. Both attacks had far-reaching global ramifications—spreading chaos throughout all types of organizations—big and small. But it looks like we got lucky.
For all of the disruption they caused, these attacks were surprisingly amateurish. Just think of the devastation a more developed attack could cause. But make no mistake—these attacks serve as a warning. Organizations need to heed the lessons learned and adjust their cybersecurity strategies accordingly.Details