847.221.0200  Main Office
800.925.0559  INCIDENT RESPONSE HOTLINE

Halock Blog

AdobeStock_85186390-woman-scales-725

PRIVACY VS SECURITY – WHAT’S THE DIFFERENCE? »

The ever-increasing demands from laws and regulations to protect personal information comes with confusion about what exactly our protection responsibilities are. One source of that confusion is in the use of the terms “privacy” and “security.” While “privacy” and “security” are both common terms used in laws, regulations, and security standards, they mean very … Read More »

AdobeStock_100397672-pros-cons-li-200-thumb

WHAT KIND OF SECURITY ASSESSMENT DO I NEED? »


What kind of security assessment do I need? It’s a question we at HALOCK Security Labs hear all the time. Every regulation and information security standard in existence tells us that we must undergo some kind of regular assessment. But the security field has not been consistent in advising what kinds of assessments fit which … Read More »

AdobeStock_75544580-compliance-li-200px

THE FTC IS TELLING US THAT PCI DSS CERTIFICATION IS NOT ENOUGH. NOW WHAT? »


As part of its enduring interest in LifeLock, Inc., the Federal Trade Commission issued the following statement on December 17, 2015, “PCI DSS certification is insufficient in and of itself to establish the existence of reasonable security protections … the existence of a PCI DSS certification is an important consideration in, but by no … Read More »

ransomware infected computer

RANSOMWARE: CURRENT STRAINS, ATTACK VECTORS AND PROTECTION »

By Steve Lawn, Senior Consultant
Staying ahead of security threats is no easy task. One threat that should definitely be on your radar is ransomware. From hospital heists to attacks on schools and other businesses, ransomware is costly and is projected to be one of the biggest threats in 2016. According to CNN, … Read More »

W2_thumb

ALERT: CRIMINALS REQUESTING W-2s VIA SIMPLE SOCIAL-ENGINEERING SCHEME »

By Todd Hacke
Tax season is a hectic time of year for not only organizations but their employees.  This year attackers are looking to take advantage of this turbulence with a simple social engineering inquiry that could land them a gold mine of personal and financial information.  It turns out all they have to do … Read More »

View Older Posts