How Much Should Good Cybersecurity Cost? Business owners and CEOs are very familiar with the financial ratios they use to run and monitor their businesses. Good Inventory turnover often varies between 2 and 10 depending on the type of business. A 2-to-1 “Current Ratio” of assets over liabilities can indicate a healthy business.
How Much Should Good Cybersecurity Cost?
More Intelligent Phishing Attacks: Click Here To Claim Your Two Night Stay at Marriott Hotels
Imagine this email subject line: “Click Here To Claim Your Two Night Stay at Marriott Hotels.” Would you read an email because of a subject line like this? It’s pretty attractive, and a similar message was sent to millions of people via email with a similar offer.
Penalties for Uber Exec Who Covered Up Data Breach
Uber was hacked in 2016, revealing the personal information of 600,000 Uber drivers and 57 million Uber passengers. If you joined Uber in or prior to 2016, there’s a good chance your data was exposed in the Uber Data Breach. Why are you learning about this now? Because on August 20, 2020, the Federal Trade Commission filed a criminal complaint against Joseph Sullivan, Uber’s former Chief Security Officer, because he not only didn’t report the crime, he actively worked to “conceal, deflect, and mislead the Federal Trade Commission about the breach,” according to the FTC.
About the Uber Data Breach
This wasn’t even the first time that Uber had been hacked: Uber had been breached in 2014, and Sullivan was selected by Uber to respond to the FTC’s inquiries into that data breach.
How To Penetrate Your Network Security? Cash!
Sometimes cyber-attacks enter your company network when an employee stumbles upon a virus-filled web page. Other times the cyber-attack begins when an employee falls victim to a phishing attack, or is tricked into downloading a virus-filled file. Other times it’s a brute force attack on your network.
Why Your Business Should Protect Consumers’ Personal Information
Does your company collect, store and protect consumer data consistent with the California Consumer Privacy Act (CCPA)? On January 1 of this year, the CCPA took effect, and already there are lawsuits being filed under its provisions. The CCPA is a far-reaching privacy law that is designed to protect California consumers by requiring companies to secure their consumer data.
The Risks of Buying Inexpensive Chinese IT components
The changes that COVID-19 has brought to this world are unprecedented, affecting every part of our lives, our businesses and our supply chains. We live in strange times when both webcams and toilet paper have become scarce on store shelves for exactly the same reason.
Why an SIEM is Critical To Your Cybersecurity Infrastructure
An SIEM is critical to your Cybersecurity planning. Why? It turns out there are many ways to secure an organization’s network, but can you depend on any of them to be 100% reliable? The answer is no. Zero-Day exploits, File-less malware, Phishing, Social Engineering, Brute Force Attacks, lost or stolen mobile devices.
Defending Against Email Security Threats
Email security threats put every business in danger. All companies are required to keep Personally Identifiable Information (PII) secure, and health care companies are also required to keep health-related information, called Protected Health Information (PHI) secure, too.