A new development has occurred in the FACC cyber “fake-president fraud” case.
Situation & Issue
A NY-based organization (acting as tax syndicator) with over 350 properties engaged us to review and modify the lender requirements and to ensure insurance compliance with the requirements from the various parties involved in a deal
When most businesses think cyber crime, they imagine brute force threats from foreign agents or highly advanced hacker teams. Executives tend to think that external forces well beyond their control make up the vast majority of security loopholes.
What does the new order do?
On May 11th 2017, President Trump issued the new, signed cybersecurity executive order that demands each federal agency and department head will be held accountable for cybersecurity risk to their enterprises; an initiative to better protect the federal government's critical data and systems. It outlines the cyber-risk reporting requirements that they must adhere to and names the framework that they'll use as the standard.
The cyber security world evolves at a breakneck pace. For those not following closely, new developments can be unexpected and downright scary.
Multiple sources reported yesterday that hackers encrypted files on computers belonging to the city of Newark and have demanded $30,000 worth of Bitcoin to restore them.
The healthcare sector is without a doubt one of the most targeted industries for cyber hackers. Different industries have different types and degrees of cyber risk exposure. But hackers and malicious campaigns take aim at the healthcare sector in particular due to the private nature and black market value of the data.
Ransomware strikes. Your critical data files have been encrypted and your business grinds to a halt.
a) spend countless hours rebuilding from backups (if you were diligent enough to ensure they'll work) or
b) pay the perpetrator to unlock your files?
Now that ransomware is spreading like wildfire through malicious emails, "malvertising" campaigns, and exploit kits, many firms and individuals face this exact scenario.
Globalization and dependence on the internet for data storage over the past decade has exposed companies to a whole new set of risks. As this trend continues, so too does the risk associated with breaches of domestic or international servers. Massive data breaches happen with alarming frequency. In the past few years, there have been several high profile attacks
This is an actual picture I took in a café of an unattended pile of documents marked “Confidential.” It blew my mind. If only this employee’s C.E.O. or C.O.O. could see this obvious disregard for the material’s confidentiality. Anyone could have grabbed the documents, peaked at the data, or… snapped a photo.