The holiday season usually means new tech gadgets for everyone to tap, swipe, click, and download. Most people who unwrap a new iPhone, MacBook, Smartwatch, Fitbit, or game console probably aren’t considering the ramifications of connecting those devices to the Internet and setting up new user accounts filled with their personal information. Unfortunately, we live in a time where have to, or at the very least, should.
Is a Cyber Breach on Your Holiday Wish List? | The Internet of Things (IoT)
Topics: Change Password Often, Cyber Breach, Cyber Security, Personal Cyber Risk, Risk Management Blog, Risk Tolerance, Total Cost of Risk (TCoR), hacking,
But, the Data was Encrypted... | California Data Breach Notification Law Amendment
Back in May 2016 I posted a blog (Be Prepared – Data Breach Notification Laws are Changing), which covered how data breach notification laws were evolving. At that time the state of Tennessee amended its law, becoming the first state in the nation to require notification of any data breach, whether the information is encrypted or not. I also predicted that state laws would most likely become stricter in the not too distant future…
Topics: Breach of Security, California Data Breach Notification Law; Data Brea, Cyber Breach, Cyber Liability, Cyber Risk, Cyber Security, Data Breach, Personally Identifiable Information, PII, Protection Bill AB2828, Risk management, Risk Management Blog
As the world focuses on the outcome of the contentious Presidential race between Trump and Clinton, the US government is on high alert for potential Election Day cyber attacks. The current global cyber climate, this summer’s Russian hack of the Democratic National Committee, and a recent string of Distributed Denial of Service (DDoS) attacks have intelligence officials highly concerned that cyber event(s) could seriously infringe on today’s election process.
Topics: Breach of Security, Cyber Breach, Cyber Insurance, Cyber Risk, Cyber Security, Data Breach, Election Day Cyber Alert, Election Day Cyber Attack, High Alert Election Day Cyber Attack, Risk Management Blog
Presidential Election Cyber Vulnerabilities | What Can We Learn?
With the Presidential Election only days away, the question remains: Will the election be hacked? In this case, a cyber breach can lead to two major issues. The first is stolen data of registered voters; the second issue and perhaps the more frightening one – manipulation of the election results.
Topics: Breach of Security, Cyber Breach, Cyber Insurance, Cyber Liability, Cyber Risk, Cyber Security, Data Breach, Political Risk, Risk management, Risk Management Blog
What’s Behind the Counter? Enterprise Risk Management Can Be a Retailer’s Edge
Enterprise Risk Management (ERM) concepts can help retailers create a competitive advantage out of the business of managing risk. ERM’s “portfolio view” collects all risk and mitigation activity into a single Risk Register. This enables management to coordinate mitigation efforts across functions, rather than leaving risk to be managed in a patchwork fashion among various pockets in the organization. These are the critical areas for retail organizations where embracing an ERM approach adds value and opportunities that would likely otherwise be “missed:”
Topics: Cyber Breach, Cyber Risk, Data Breach, Enterprise Risk Management (ERM), Enterprise Risk Management, Enterprise Risk Management, ERM, Reputational Risk, Retail Risk Management, Risk management, Risk Management Assessment, Risk Management Blog, Risk Register, Social Media Risk
The Personally Identifiable Information (“PII”) of approximately 10,000 past and present employees of Seagate Technology, a leading electronics and data storage solutions manufacturer, was handed over freely to cybercriminals. The information included W-2 forms, names of beneficiaries, social security numbers of employees and spouses, etc. Needless to say, the impacted people are not thrilled and have brought suit against Seagate for malpractice and a lack of regard for employees affected by the negligent handling of data.
Topics: Breach of Security, Cyber Breach, Cyber Liability, Cyber Risk, Cyber Security, Data Breach, Phishing Scam, Risk Management Blog, Seagate Class Action Suite, Seagate Cyber Attack, Seagate Phishing Scam
Ransomware Events are on the Rise | Protect your Networks Now (Part 2)
In Part 1 of this post, I noted that ransomware events are occurring much more frequently; as many as 4,000 a day since January 1st of 2016. We took a look at some preventative measures that may protect your company and its network/data against a ransomware event.
Topics: Breach of Security, Cyber Breach, Cyber Liability, Cyber Risk, Cyber Security, Data Breach, Incident Response Plan, Ransomware, Risk management, Risk Management Blog
Ransomware Events are on the Rise | Protect your Networks Now (Part 1)
The U.S. Department of Justice stated that “More than 4,000 ransomware attacks have occurred daily since January 1, 2016. This is a 300 percent increase over the approximately 1,000 attacks per day seen in 2015.”
Essentially, no particular user, company or business sector is safe. Although the Healthcare and Retail industries are targeted for their volume and value of data, home computers may also fall victim to ransomware.
Topics: Breach of Security, Cyber Breach, Cyber Liability, Cyber Risk, Cyber Security, Data Breach, Healthcare, Ransomware, Retail, Risk Management Blog
Between company logins, online banking, personal email accounts, and various social media accounts the average user is required to come up with a lot of passwords. Unfortunately, many use the same password for all of their logins, simply for the sake of convenience. This poses a huge security risk, as once any one of those services is hacked and the user’s password becomes compromised, all of the other accounts are in jeopardy.
Topics: Change Password Often, Cyber Breach, Cyber Liability, Cyber Risk, Cyber Security, Password Diversity, Risk Management Blog
Just Wait … It Gets Worse | the Sequel to Ransomware
Cisco has released the 2016 Midyear Cybersecurity Report and their findings point to future, more sophisticated types of ransomware that will take full advantage of systems with less than satisfactory security measures, patching practices, and detection rates.
Topics: Breach of Security, Cisco Midyear Cybersecurity Report 2016, Cyber Breach, Cyber Risk, Cyber Security, Ransomware, Risk Management Blog