While you may not be able to prevent all ransomware, you can be prepared to outsmart it.
Concluding this series… Your state’s privacy and breach notification statutes may differ from HIPAA regulations.
After a data breach, everything you have done, everything you have discovered, and everything you have reported must be documented.
Part Two in a series on the fundamental questions about Incident Response tackles when and how a breach must be reported.
In Part One of a planned series of articles to look at Incident Response best practices, we start by discussing who is required to report a security incident to regulatory authorities, government agencies, or consumers/patients.
This holiday season, retailers are more liable for credit card fraud as they still work to implement EMV chip technology. Stores and consumers have new tools but will also face new risks and cyber threats.
When hardware or equipment becomes obsolete or simply no longer meets the needs of your company, where does it go? If not handled correctly, the data could cause problems down the road.
Floridians tell ourselves we are not really at risk for a hurricane. I hear the same sentiment from executives about their cyber security risk. We tend to downplay common threats but how dangerous could denial really be?
If (when) your company encounters an IT security incident or data breach, you will need every employee ready to respond quickly and effectively as appropriate for their position. Share these tips to be sure they’re ready.
The FREAK vulnerability affects some implementations of SSL/TLS that may allow an attacker to decrypt secure communications between vulnerable clients and servers. Are your systems at risk?