Brand equity is defined as “a set of assets and liabilities linked to a brand name and symbol, which add to or subtract from…
Risk
How the Affordable Care Act Impacted Cyber Security for HealthCare Providers
The Affordable Care Act put the interest of consumers first, however with its data collection, exchange and storage, it came with an new cyber…
Mamba Ransomware: The Return of an Old Threat
Long long ago (in 2016), before the havoc brought by WannaCry and Petya there existed another dangerous ransomware that was named Mamba. Just like…
Return of WannaCry? LG Hit by Ransomware Attack
On Wednesday August 16th representatives for LG South Korea have confirmed they were the victim of a cyber attack, which hit them on Monday…
New Hotel WiFi Malware
Shadow Brokers, the group behind WannaCry, has indirectly transferred the leaked NSA exploit, EternalBlue, to another group of hackers.
Top 8 Security Design Principles for IoT Product Developers in the Private Sector
The Internet of Things (IoT) is defined as “a pervasive and ubiquitous network which enables monitoring and control of the physical environment by collecting,…
Nationwide Mutual Insurance agrees to $5.5M Settlement for Data Breach
Major insurance company Nationwide Mutual Insurance has voluntarily settled with the attorney generals of 32 states and the District of Columbia. Nationwide has agreed…
Still Vulnerable: Many Firms Security Practice Unchanged Since NotPetya and WannaCry
Two of the most economically disruptive ransomware collectively cost businesses millions in damages. NotPetya and WannaCry wreaked havoc across the globe and caused panic…
The Economic Value of Data and How to Protect it
All the discussion and panic about cyber security can be overwhelming and shift focus away from the value of the data they are sitting…
The Legacy Risk: How Outdated Systems Expose Your Data
Some things do get better with age, like wine and cheese for example. But something that doesn’t get better with age are computer operating…
On the Frontlines: Endpoints and Your Insiders
Comscore reported that half of all digital time was spent on smartphone apps, and that a total of 68 percent of time was spent…
How to Create an Insider Incident Response Plan
It’s time for organizations to face reality: the sheer amount of cyber attacks essentially confirms that organizations will at some point be under attack…