|Cybersecurity = Technology + Humans|
|Anne Bisagno—Wednesday, September 20, 2017
The human mind can't work as fast as a cognitive security solution, but people are the ones coming up with cyberattacks. That's why you can't afford to
rely on security technology alone. People need to supplement algorithms to put suspicious activity into context and rule out false positives.
|Equifax Security Breach – What Should You Do?|
|Anne Bisagno—Monday, September 18, 2017
As you may have read, Equifax was recently hacked. This is a big deal because Equifax is one of four credit rating services, called Credit Bureaus (the other three are Experian, Trans Union and Innovis).Credit
bureaus harvest (and sell) the financial data and credit ratings of almost every citizen in the United States. And unfortunately, over 143 million
Equifax records may be compromised. Their records include people's names, Social Security Numbers, addresses and, in some instances, driver's license
|The Recycle Bin is Not a Backup!|
|Anne Bisagno—Wednesday, September 13, 2017
There's nothing quite like the rush of relief when you find a copy of an accidentally deleted file in Office 365's Recycle Bin. But don't make the mistake of counting on it as a form of backup. It's a common practice — a new survey shows nearly two-thirds of Office 365 admins do it — but
that's not what Recycle Bin is made for. For one thing, it doesn't have the security safeguards necessary to protect data in Office 365 business
services like OneDrive, Exchange, and Sharepoint. More critically, if a file in Recycle Bin gets deleted or ages past 30 days, it's gone. Most
|Your Data is Valuable. Treat It That Way.|
|Anne Bisagno—Wednesday, September 06, 2017
The more data you have about your organization and its customers, the more valuable that data is — and not just to you. Every time you and your partners
exchange huge data sets, cyber criminals are likely to come sniffing around, hoping to find an infrastructure vulnerability that will let them steal
your information and put it to some use you never intended. And that's a big problem for you and your customers alike.
|Lead, Don't Bleed|
|Anne Bisagno—Wednesday, August 30, 2017
As cybersecurity threats become more complex and frequent, it's critical to keep security tools up to date — but many small and midsize businesses
don't have a security strategy at all, never mind the latest defenses. Don't leap to the latest and greatest without following these best practices,
|Healthcare is Getting More Secure|
|Anne Bisagno—Wednesday, August 23, 2017
A record high number of US healthcare organizations reported data breaches in
2016, according to a new analysis of data from the US Department of Health and Human Services. The number of healthcare businesses reporting a breach
shot up to an all-time high of 328 in 2016, a 22.3% increase over the previous record of 268 in 2015.
|New Help for SMB Cybersecurity|
|Anne Bisagno—Wednesday, August 16, 2017
The Federal Trade Commission has launched a new website to help smaller companies stay on top of cybersecurity.
|Reminder: People are the Weakest Security Link|
|Anne Bisagno—Wednesday, August 09, 2017
Companies spent more than $18 billion on cybersecurity in 2016 — but data breaches hit an all-time high anyway. What's the problem? Simple: we're not using employees as the critical line of defense they can be.
|Paying the Price for Data Breaches|
|Anne Bisagno—Wednesday, August 02, 2017
Target's price tag for its infamous 2013 data breach keeps getting higher. Last month, it agreed to pay $18.5 million to 47 states and the District of
Columbia, implement specific security controls, put a cybersecurity governance framework in place, and adhere to certain audit and reporting guidelines.
And that's on top of the $202 million it's already spent on legal fees and other costs since the attack. Experts say that the settlement is a signal
that companies will continue to be on the hook for massive financial penalties if they suffer data breaches.
|Security Policies Have to Apply to Everyone|
|Anne Bisagno—Wednesday, July 26, 2017
CEOs, are you using "shadow IT" — applications and programs your IT department hasn't approved? You're not alone.
A new report says 75% of CEOs do just that, even though 91% acknowledge it could put their company at risk.