Incident Response Planning : The 7 Stages of Incident Response – Part 1

Incident response plans will be integral to helping organizations manage the aftermath of a breach in a way that limits damage and reduces recovery time and costs. According to an FBI report, ransomware alone caused more than 4,000 attacks daily in 2016, a 300 percent increase over the previous year. Malware strains are continually evolving to subv...

Ransomware : Targeting the Fault-lines in Patch Management Practices

Ransomware is currently one of biggest challenges in cyber security. Ransomware basically encrypts and locks you out of your critical assets, and it also asks you to pay, to recover access to those assets. Some organizations believe they don't have an option and eat the cost, although there's no guarantee that access will actually be reinstated. T...

NYDFS Cybersecurity Regulations : Discussing the Financial Cybersecurity Compliance Requirements

For years, governing agencies and leaders have held the "it won't happen to us" mentality that comes with cyber attacks. However, threats are becoming more sophisticated at a faster rate than anyone ever expected. New techniques are emerging constantly to get around current security systems and compromise sensitive resources. The increasing likelih...

Data Security in Health Care : How HCOs Can Go About Safeguarding PHI

Protecting sensitive and personally identifiable information (PII) has become a main priority for health care organizations (HCOs). Not only do medical professionals need to be able to access patient files regularly, they must also comply with strict industry regulations that detail how this Protected Health Information (PHI) can be stored, modifie...

Payment Card Malware Hits Retail Chains Across The US

Hackers have become more adept at creating methods to steal sensitive information that will yield a lucrative payday when sold on the dark web. Personal details fetch a considerable amount of money and are used to steal identities and access bank accounts. According to a cybersecurity research report, if a seller supplies full details about a card ...