<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1557350231232256&amp;ev=PageView&amp;noscript=1">

What Companies Need To Know Before Implementing A Biometric Security Protocol

 

The increased ability to use biometric data for a variety of purposes has the potential to improve security and privacy in the cyber world significantly. Voice recognition software, fingerprint IDs, facial recognition software are all touted as ways of preventing unauthorized access to computer systems and improving security.

The Value Of Connections - Network Connectivity And Interrupted Service Risks For Your Business

How much would it cost your business to shut down for a week? How much would it cost your business to shut down for a month? Employees unable to get work done, unable to complete sales orders or deliver products to your customers? For some businesses, the answer to that question can be in the millions.

Law Firms Remain A Smaller, Though Viable, Target For Cyber Criminals

The Dark Overlord hack stands at the intersection of a number of prominent issues in the modern world: terrorism, cyber warfare, confidentiality and privacy. On New Year’s Eve, 2018, a group of hackers calling themselves Dark Overlord stated they had hacked confidential legal files related to the insurance litigation that followed the 9/11 attacks. The hackers demanded a ransom from the law firm from whom the information was stolen. Apparently, the ransom was paid but the law firm breached the terms of the ransom by reporting the breach to law enforcement. Now the hackers have threatened to sell the information online through the dark web.

Nuances In Types Of Scams Require Different Training And Different Cyber Insurance Coverage

Social engineering attacks continue to represent a significant attack vector on U.S. businesses.  The frequency and cost of these attacks keep increasing.  Businesses need to protect themselves or they could be facing large losses.  While people tend to view hackers as computer whizzes exploiting technical flaws in software code, the reality is that over 95% of attacks focus on exploiting human weaknesses, not technological ones.

Your business probably has the same cybersecurity vulnerabilities that Equifax did when they were hacked

Your business probably has the same cybersecurity vulnerabilities that Equifax did when they were hacked.png

Another major data breach at an American company worth billions of dollars has served to heighten cyber security concerns in businesses of many sizes in many countries. Equifax announced in September 2017 that a massive theft of data from their system had occurred. The failures of Equifax's cybersecurity team resulted in hackers obtaining the personal information of over one hundred and forty-five million of the people whose credit history Equifax tracked.

What Any Business Can Learn From The Equifax Hack

Equifax faced criticism after how the company reacted to a hack that was announced in September 2017. When dealing with a cybersecurity event, a quick response is necessary to minimize damages from the event.  Delays can cause continued interruptions in day to day business processes the damage or loss of vital information; they can also make it harder to track down perpetrators and recover both data and money from them.  To this end, most cybersecurity experts recommend that businesses put in place an incident response plan so that teams can act as quickly as possible after an incident instead reacting with a frantic, disorganized frenzy of activity.

Businesses WannaCry After Companies Hacked Globally

A massive ransomware attack crippled thousands of businesses around the globe on May 12, 2017.  Nicknamed WannaCry, the attack hit Britian’s National Health Services, FedEx, and ahost of major companies.  Preliminary reports estimate the number of affected companies at over two hundred thousand.  It is too early to put a number to the economic damage caused by the attack, but it serves a critical reminder of important cyber security principles.

Is It Worth The Risk? Personal Devices At Work Continue To Be A Threat To Network Security

As cyber security events make headline news, businesses have to examine their cyber practices to reduce their vulnerabilities. The damages and losses from cyber events continue to increase; this leaves many businesses asking what they can do to reduce their exposure. Cyber insurance can play a crucial role, but the relatively new nature of the coverage and gaps in coverage still mean that the best way to avoid losing money due to a breach is never suffering from a breach in the first place. One of those gaps could be your employee's personal devices.

Cyber Island Hopping Leaves Small Businesses Exposed To Big 3rd Party Risks

An emerging area of cyber liability for small businesses centers around the concept of third party risk.  Third party risk means damages resulting from the security breach of a connected party - normally vendors or customers.  Small businesses can face third party cyber risk on a number of fronts.  They can face liability from a breach of their own systems infecting a vendor; they can also face damages caused when the breach of a vendor causes a breach of their own systems.  Franchisee relationships have also caused increasing concerns of cyber risk.

Where To Start? Tips For Businesses Taking Steps To Improving Their Cyber Security

Cyber criminals have a large number of ways of gaining access to a company’s computer systems.  What they do when they gain access to that system can also vary widely.