Social Media Cyber Security Risks and Best Practices for Businesses

The biggest social media cyber security risks businesses face and how to avoid them Businesses tend to gloss over social media cyber security, thinking that it’s more of an issue in their employees’ personal lives than a threat to workplace cyber security. However, one in eight enterprises have suffered a security breach that was traced… Read More

Cyber Security Best Practices When Using Public WiFi Networks

How to Protect Yourself on Public WiFi Networks Once a luxury item, free public WiFi has morphed into a standard service that consumers expect when patronizing everything from restaurants and retail stores to airports and hotels. Free WiFi users aren’t just checking Facebook or posting vacation photos to Instagram, either; all of us have sat… Read More

What Is Multi-Factor Authentication, and Why Is It So Important?

Passwords are no longer enough; your business needs multi-factor authentication  Organizations can no longer depend on passwords alone to protect their systems and data, especially since 25% of employees admit to using the same password for all of their accounts, at home and at work, and stolen account credentials are hackers’ preferred way to break… Read More

Business Email Compromise Losses Top $12 Billion Globally, Says FBI

Business email compromise scams have been reported in all 50 states and in 150 countries Global losses from business email compromise scams, a highly sophisticated form of phishing, grew by 136% between December 2016 and May 2018 and now exceed $12 billion, according to a public service announcement released by the FBI. What Is a… Read More

Nearly 340 Million Records Exposed in Exactis Data Leak

Size of Exactis Data Leak Could Surpass Equifax Last week’s data leak at Exactis, a Florida-based marketing and data aggregation firm, has cyber security experts and data privacy advocates up in arms. WIRED reports: Earlier this month, security researcher Vinny Troia discovered that Exactis, a data broker based in Palm Coast, Florida, had exposed a… Read More

Tesla Breach Demonstrates the Importance of Industrial Cyber Security

Industrial Cyber Security is Just as Important as Securing Information Systems Massive data breaches are what grab headlines, but industrial cyber security attacks can be devastating in the real world. Tesla has just learned this lesson the hard way. CEO Elon Musk has accused a malicious company insider of altering product code, stealing data and… Read More

6 Reasons Why You Shouldn’t Use Spreadsheets as GRC Tools

Spreadsheets Are Not GRC Tools Despite the availability of modern GRC tools, many organizations still use spreadsheets to conduct IT compliance audits and other GRC activities. While spreadsheets are highly useful for many business functions, especially accounting, they are not GRC tools. Depending on spreadsheets to manage GRC processes is time-consuming, costly, and inefficient at… Read More

5 Things to Know About Email Marketing and the EU GDPR

Before you send out that next email marketing blast, make sure you’re compliant with the EU GDPR Email marketing is big business. MarTech Advisor reports that it is the best-performing channel for a company’s ROI, and 61% of consumers prefer to receive offers via email, as opposed to only 5% who prefer social media offers.… Read More

GDPR Compliance Issues Could Cause WHOIS Directory to Go Dark

WHOIS service in jeopardy as EU authorities reject ICANN’s interim solution to GDPR compliance for vital “internet phonebook” The deadline for compliance with the EU’s General Data Protection Regulation (GDPR) is fast approaching, and an astounding number of organizations are woefully unprepared to meet it. A new survey of IT decision-makers by Crowd Research Partners… Read More

Best Practices to Prevent Supply Chain Cyber Attacks

Hardware & Software Supply Chain Cyber Attacks Pose Significant Threats Due to globalization and outsourcing, enterprise supply chains are more intricate than ever. Most products are no longer manufactured by a single entity. Materials, components, and even final products pass through multiple hands before ending up in the hands of end users. Additionally, most companies… Read More

The 12 Biggest Cloud Security Threats Facing Your Organization

New CSA Report Reveals the Top 12 Cloud Security Threats in 2018 Cloud computing has opened up a world of opportunities for businesses, but it has also resulted in new cyber security threats. Some of these mirror the threats organizations have been combating on premises for years, while others are unique to the cloud. What… Read More

Employees Are Biggest Threat to Healthcare Data Security

Two new reports illustrate the threat of employee carelessness and maliciousness to healthcare data security Healthcare data security is under attack from the inside. While insider threats – due to employee error, carelessness, or malicious intent – are a problem in every industry, they are a particular pox on healthcare data security. Two recent reports… Read More

#MeToo Prompts Employers to Review their Anti-Harassment Policies

Comprehensive anti-harassment policies are even more important in light of #MeToo movement The #MeToo movement, which was birthed in the wake of sexual abuse allegations against Hollywood mogul Harvey Weinstein, has shined a spotlight on the epidemic of sexual harassment and discrimination in the U.S. According to a nationwide survey by Stop Street Harassment, a… Read More

Thousands of Websites Infected in Massive Cryptojacking Attack

Hackers installed cryptojacking malware by compromising a popular browser extension Thousands of websites, including government sites in the United States, the U.K., and Australia, were ensnared in an international cryptojacking scheme, The Register reports: The affected sites all use a fairly popular plugin called Browsealoud, made by Brit biz Texthelp, which reads out webpages for… Read More

GSA Proposes Changes to Federal Contractor Cyber Security Rules

Stronger GSA Federal Contractor Cyber Security Rules Are Coming The General Services Administration (GSA) is planning to tighten up federal contractor cyber security requirements regarding sensitive non-classified data, according to a Federal Register Notice dated January 12. The rules would cover internal contractor systems, external contractor systems, cloud systems, and mobile systems. Technically, the proposed… Read More

5 Best Practices for Complying with SEC, NFA FINRA Cyber Security Standards

Complying with SEC, NFA FINRA Cyber Security Standards  Both the SEC, NFA and FINRA have indicated that they will put heavy emphasis on cyber security enforcement throughout 2018. While FINRA is explicit – among other things, it publishes a cyber security checklist and a detailed report on best practices – the SEC’s guidance is far… Read More

5 Reasons Why Your Enterprise Should Put IRM Before GRC

Gartner Is Shifting Its Focus Toward IRM, and You Should, Too Over the summer, Gartner announced that it was moving its focus away from GRC and launching a new Magic Quadrant for integrated risk management, or IRM: IRM enables simplification, automation and integration of strategic, operational and IT risk management processes and data. IRM goes… Read More

GDPR Compliance Means Transforming Your Data Governance

Data Governance Is at the Core of GDPR Compliance Organizations have until May 25, 2018, to comply with the EU’s new General Data Protection Regulation (GDPR). Arguably the most comprehensive, far-reaching data privacy law passed to date, the GDPR grants European consumers numerous new data privacy rights and places new data governance responsibilities on organizations.… Read More

Unencrypted Retail POS System Cited in Forever 21 Breach

Forever 21 Breach Disclosed on the Cusp of the Holiday Shopping Season Clothing retailer Forever 21 suffered a POS system breach in an undisclosed number of stores from March to October 2017, the company announced last week. The Forever 21 breach was discovered by a third party and involved hackers taking advantage of POS systems… Read More

Social Media Security and the Trump Twitter Account Incident

Social Media Security Matters; Just Look at the Trump Twitter Account Debacle The recent Trump Twitter account incident – where the president’s Twitter feed was deactivated for 11 minutes – was fodder for many late-night television jokes. All kidding aside, though, enterprise social media security is serious business. A social media presence is an integral… Read More

Why Cloud Service Providers Should Consider FedRAMP Certification

FedRAMP Certification Can Help Grow Your Cloud Service Business The Federal Risk and Authorization Management Program (FedRAMP) was designed to support the federal government’s “cloud-first” initiative by making it easier for federal agencies to contract with cloud providers. Like FISMA, DFARS, CJIS, and HIPAA, FedRAMP’s security controls are based on NIST 800-53. If your cloud… Read More