"The Cloud" is as mysterious to most people as brain surgery or rocket science...we know it exists, we know some people understand it, and we know that we aren’t those people. But just as we make assumptions about everything else we don’t fully understand, we make assumptions about cloud computing.
We’re all concerned about protecting our business with strong Cybersecurity. If you already have your cybersecurity handled, what kind do you have? Is yours more of the “Set It And Forget It” variety or is your cybersecurity more fluid and active? If you haven’t talked with your cybersecurity team in over a month, or if you’ve installed some antivirus software on your computers last year, and in either case believe that you’re protected, then you’ve got "Set It And Forget It cybersecurity.
How Much Should Good Cybersecurity Cost? Business owners and CEOs are very familiar with the financial ratios they use to run and monitor their businesses. Good Inventory turnover often varies between 2 and 10 depending on the type of business. A 2-to-1 “Current Ratio” of assets over liabilities can indicate a healthy business.
Imagine this email subject line: “Click Here To Claim Your Two Night Stay at Marriott Hotels.” Would you read an email because of a subject line like this? It’s pretty attractive, and a similar message was sent to millions of people via email with a similar offer.
Uber was hacked in 2016, revealing the personal information of 600,000 Uber drivers and 57 million Uber passengers. If you joined Uber in or prior to 2016, there’s a good chance your data was exposed in the Uber Data Breach. Why are you learning about this now? Because on August 20, 2020, the Federal Trade Commission filed a criminal complaint against Joseph Sullivan, Uber’s former Chief Security Officer, because he not only didn’t report the crime, he actively worked to “conceal, deflect, and mislead the Federal Trade Commission about the breach,” according to the FTC.
About the Uber Data Breach
This wasn’t even the first time that Uber had been hacked: Uber had been breached in 2014, and Sullivan was selected by Uber to respond to the FTC’s inquiries into that data breach.
Sometimes cyber-attacks enter your company network when an employee stumbles upon a virus-filled web page. Other times the cyber-attack begins when an employee falls victim to a phishing attack, or is tricked into downloading a virus-filled file. Other times it’s a brute force attack on your network.
Does your company collect, store and protect consumer data consistent with the California Consumer Privacy Act (CCPA)? On January 1 of this year, the CCPA took effect, and already there are lawsuits being filed under its provisions. The CCPA is a far-reaching privacy law that is designed to protect California consumers by requiring companies to secure their consumer data.
The changes that COVID-19 has brought to this world are unprecedented, affecting every part of our lives, our businesses and our supply chains. We live in strange times when both webcams and toilet paper have become scarce on store shelves for exactly the same reason.
An SIEM is critical to your Cybersecurity planning. Why? It turns out there are many ways to secure an organization’s network, but can you depend on any of them to be 100% reliable? The answer is no. Zero-Day exploits, File-less malware, Phishing, Social Engineering, Brute Force Attacks, lost or stolen mobile devices.
Email security threats put every business in danger. All companies are required to keep Personally Identifiable Information (PII) secure, and health care companies are also required to keep health-related information, called Protected Health Information (PHI) secure, too.