Monday, November 4, 2024
The Importance of Data Backup and Recovery Plans for Businesses - In modern businesses, data is central to operations, customer management and decision-making. It is so integral to organizations that data loss from...
Monday, November 4, 2024
MFA Bypass Attacks Explained - Multifactor authentication (MFA) is an integral component of cybersecurity. By requiring additional steps to access data, information is more secure and harder to steal. However,...
Friday, November 1, 2024
Navigating Cybersecurity Challenges in the Construction Industry - The construction industry is continuously moving toward digitization, adopting advanced technology such as artificial intelligence, the Internet of...
Monday, September 30, 2024
EBSA Releases Updated Cybersecurity Guidance for Employee Benefit Plans - Through Compliance Assistance Release No. 2024-01, the U.S. Department of Labor’s Employee Benefits Security Administration (EBSA) is confirming...
Friday, September 27, 2024
Understanding Cybercriminals: Motivations, Methods and Protection Strategies - Cyberattacks can impact a company in numerous ways. They can create significant financial losses through fines, lawsuits and business...
Tuesday, August 27, 2024
The Role of a Public Relations Specialist in Cyber Incident Response - When cyber incidents strike, organizations need to respond swiftly and effectively to limit related losses. As such, it’s crucial for organizations...
Tuesday, August 27, 2024
SIM-Swapping Attacks Explained - In recent years, a growing number of organizations have implemented stronger cybersecurity measures, including multifactor authentication (MFA). This method requires a user to present...
Thursday, July 25, 2024
The Role of a Data Breach Coach in Cyber Incident Response - Cybersecurity events can lead to businesses sustaining substantial financial and reputational damage. Recovering from these incidents can also be complicated...
Wednesday, July 24, 2024
Cyber Insurance - Heightened claim frequency and severity have created a volatile cyber insurance market in recent years, with most policyholders facing ongoing premium increases. Fortunately, the segment experienced...
Thursday, June 27, 2024
Defending AI Systems From Malicious Data Poisoning Attacks - As the use of artificial intelligence (AI) and machine learning (ML) continues to grow, businesses that utilize these technologies must also be aware of the...
Thursday, June 27, 2024
- On May 31, 2024, the U.S. Department of Health and Human Services’ (HHS) Office for Civil Rights (OCR) updated its frequently asked questions (FAQs) regarding HIPAA and the recent cybersecurity incident involving...
Friday, May 24, 2024
Cybersecurity Awareness Programs: Benefits and Implementation - Businesses of all sizes are susceptible to cyberattacks such as phishing scams, malware attacks and ransomware schemes, which can create significant...
Wednesday, April 24, 2024
Cloud Security Management Explained - Cloud computing refers to a pay-per-use service that equips users with on-demand access to a range of IT resources (e.g., databases, software, servers, networking and analytics...
Monday, April 8, 2024
- Data Breach Class Actions Skyrocketed in 2023 - Data breach class action lawsuits “exploded” in 2023, according to Duane Morris LLP’s Class Action Review 2024, becoming one of the fastest growing areas of litigation...
Friday, November 17, 2023
MGM Cyberattack Emphasizes Need for Layered Digital Defenses - The odds are stacked in favor of increasingly bold and sophisticated cybercriminals, as MGM Resorts International and Caesars Entertainment learned back in...
Tuesday, October 10, 2023
MGM Cyberattack Emphasizes Need for Layered Defenses - The odds are stacked in favor of increasingly bold and sophisticated cybercriminals, as MGM Resorts International and Caesars Entertainment learned this week,...
Monday, September 25, 2023
- - SEC Adopts Final Rules for Public Companies’ Cybersecurity Disclosures - On July 26, 2023, the U.S. Securities and Exchange Commission (SEC) published final rules to enhance and standardize how companies disclose...
Thursday, August 24, 2023
- Average Data Breach Cost Hits All-time High of $4.4M - According to IBM’s annual Data Breach report, the average cost of a data breach reached an all-time global high of $4.45 million, up 2.3% from 2022 and 15.3%...
Tuesday, August 15, 2023
- The Value of Cyber Insurance - As cyberattacks become more frequent and costly, it’s crucial for organizations to maximize their financial protection against related losses by purchasing sufficient insurance. Cyber...
Monday, May 15, 2023
When employees leave a company, there is a heightened risk of data theft, which is also known as data leakage or exfiltration. This risk is present whether an employee’s departure is voluntary or not. The consequences...
Tuesday, May 2, 2023
When a data breach or other cyber event occurs, the damages can be significant, often resulting in lawsuits, and serious financial losses. What’s more, cyber exposures impact businesses of all kinds, regardless of their...
Wednesday, March 22, 2023
Mobile malware-malicious software designed to gain access to private data on mobile devices-is a growing threat to companies’ cybersecurity. As companies embrace remote work and more employees use their personal devices...
Friday, January 20, 2023
Cyber incidents-including data breaches, ransomware attacks and social engineering scams-have become increasingly prevalent, impacting organizations of all sizes and industries. Such incidents have largely been brought...
Tuesday, November 22, 2022
Employees are an organization’s first line of defense against cybercriminals. For this reason, they are also commonly targeted. In fact, the vast majority (88%) of data breaches are caused by employee mistakes,...
Tuesday, October 11, 2022
Modern vehicle technology has transformed in the past several years as autonomous driving, vehicle electrification and car connectivity features have become more common. While these digital innovations in the automotive...
Friday, October 7, 2022
Endpoint detection and response (EDR) is a cybersecurity solution that continuously monitors security-related threat information and endpoint data to detect and respond to ransomware and other kinds of malware. It...
Monday, May 16, 2022
Identifying and Avoiding Phone Scams - Every year, people report fraud, identity theft and bad business practices to the Federal Trade Commission (FTC) and law enforcement partners. According to FTC data, more than 2.8...
Thursday, February 10, 2022
- - Data Breaches Rose 68% in 2021, Hitting a New High With No Signs of Slowing - According to the Identity Theft Resource Center’s (ITRC) annual report-which advocated for more effective laws and regulations to better...
Monday, August 9, 2021
Critical infrastructure cyberattacks are increasing in frequency according to Advisen’s loss database, and some experts are worried the worst is yet to come. There are sixteen industry sectors in the United States that...
Monday, July 26, 2021
Penetration Testing Explained - Keeping workplace technology up and running is vital to any organization’s success. While this task seems feasible, it’s growing harder and harder each year as cybercriminals expand their...
Wednesday, June 30, 2021
Friday, June 18, 2021
The Importance of a Standalone Cyber Insurance Policy - Over the course of the past decade, many organizations have relied on standard property and liability coverage rather than a standalone cyber insurance policy to...
Wednesday, June 2, 2021
High-profile cyber attacks on companies such as Target and Sears have raised awareness of the growing threat of cyber crime. Recent surveys conducted by the Small Business Authority, Symantec, Kaspersky Lab and the...
Tuesday, February 9, 2021
Deepfakes Explained - Deepfakes refer to sophisticated forgeries of an image, video or audio recording. Deepfakes have been around for years-you can even find a version of them in social media applications. For instance,...