INFOGRAPHIC: Healthcare and Data Breaches
Healthcare and Data Breaches. Click to view full image.
By Erik Leach, CISSP, SCF
Imagine coming home and finding your house broken into and some of your belongings missing. As you totter from room to room, you would probably feel anger, frustrated, disturbed and a little overwhelmed. At a vulnerable moment such as that, it probably would not be the best time to engage in critical decision making that would most likely prove reactionary. This analogy can be applied to the instance of a data breach. (more…)
Why a Chicago-Based Cyber Security Firm Just Released its Prized IP.
By Chris Cronin, ISO 27001 Auditor, Partner (more…)
Viviana Wesley, Managing Consultant at HALOCK, is used to being one of few women specializing in cyber security. But last week, for a change, she wasn’t alone. At the Women in Cybersecurity (WiCyS) Conference in Chicago, she was one of nearly a thousand participants from industry, academia, and areas of research who gathered for the organization’s fifth annual conference, designed to recruit, advance and retain women in that field. (more…)
by Glenn A. Stout, Ph.D., CISM, GSEC, PMP, Managing Consultant, Governance & Compliance Services
As families prepare to take to the beaches, resorts and other vacation spots all over the world, bad actors area also preparing their various attacks on the unsuspecting. (more…)
Two things are inherently true when it comes to cybercriminals. The first is that they follow the money. This is why ransomware grew to a billion dollar business overnight. The second is that like water, their efforts flow towards the path of least resistance. Cybercriminals are like many people, they go for the easy money. Phishing has been the dominant delivery method for malware and cyberattacks for a number of years now. However, phishing is not as easy as it used to be. Spam filters and email gateways now react quickly in shutting down a malicious email domain. Email security technology is now using analytics to more accurately identify behavior abnormalities and possible email threats. Even users are growing more guarded when opening emails and are becoming more astute at identifying suspicious links and attachments. We have a long way to go of course, but it is getting better. (more…)