Concerns about data privacy and security have never been higher in the United States. With the steady stream of news regarding data breaches and theft, anxiety and a feeling of helplessness are commonplace. A 2018 survey of 10,000 consumers, conducted by the Harris Poll revealed that 78 percent of U.S. respondents say a company’s ability to keep their data private … Read More
Safari Malware – A Closer Look at Malicious Software that Preys on Apple’s Mac OS-X and iOS
Apple’s Mac OS-X and iOS operating systems have traditionally been highly resistant to malware, leaving bad actors to concentrate their efforts on infecting individual components of a desktop, such as the Safari web browser. For years, the prevailing wisdom has been that Apple hardware or software simply can’t be infected by viruses or other malicious software – a view that … Read More
The Use of Blockchain in Healthcare – How Can Technology Keep Health Data Secure and Private?
Blockchain technology is being proposed as a means of preserving the integrity and confidentiality of stakeholder information in the health sector. Individuals and organizations in the healthcare industry are making increasing use of the cloud, to cut down on management costs and data access times. This comes at a potential cost in data security, if cloud services are poorly delivered … Read More
Cybersecurity Compliance Frameworks
In order to observe best practices, and to meet with technical and other requirements, organizations often use frameworks for cybersecurity compliance and regulatory compliance. These frameworks provide best practices and guidelines to assist in improving security, optimizing business processes, meeting regulatory requirements, and performing other tasks necessary to achieve specific business objectives such as breaking into a particular market niche … Read More
Social Engineering Attacks – How to Avoid Becoming a Victim
Cyber-attacks have increased in sophistication – not only in the technology and resources available to hackers but also with the evolution of techniques like social engineering. Just as a galvanized steel chain is only as strong as its weakest link, the security of your business is only as good as its most vulnerable elements. And for the majority of businesses, … Read More
Web Cache Poisoning – How Hackers Are Weaponizing Web Caches
In a recently discovered (but yet to be fully publicized) attack, security researcher James Kettle has apparently succeeded in cache poisoning, the hacking and weaponizing of the web caches of several major websites and online platforms. The victims include online stores, a software product, a video game, a popular cloud platform provider, a hosting platform provider, an investment company’s investor … Read More
Leaked Credentials – An Insidious Problem for the Enterprise
Though data breaches have the potential to expose corporate secrets, finances, and intellectual property to prying eyes, a more insidious problem for the enterprise is the issue of leaked credentials. Email and network usernames, passwords, and related information may also form a major part of the corporate data leakage that follows a serious breach. And since these identifiers may be … Read More
Employee Security Awareness Training – Management Side
As many organizations have learned to their regret, a policy for cybersecurity – however comprehensive, proactive, and technologically sound it may be – is doomed to failure if its terms aren’t adhered to by stakeholders of the enterprise, across the board. This emphasizes the need both for eliciting buy-in to the concept and culture of security awareness, and for management … Read More
The Benefits of Real-Time Cyber Threat Intelligence
To protect their personnel, assets, and sensitive information from being compromised, hijacked, or stolen by malicious actors, organizations are often advised to adopt security best practices, and to deploy the latest in secure technologies. But these things can’t be pulled out of thin air, or identified and adopted without knowledge of what they are, how they should be used, and … Read More
How will GDPR Affect Social Media Marketing?
The May 25th, 2018 deadline for its formal introduction has passed and organizations across the globe are scrambling frantically to ensure that they’re prepared to meet the demanding terms of the European Union’s (EU’s) General Data Protection Regulation or GDPR. It’s a legal and compliance framework designed to safeguard the privacy and data rights of EU citizens and residents – … Read More