Look

now browsing by tag

 
 

Companies #Look To #Cyber Insurance For #Protection Against #Hackers

more information on sonyhack from leading cyber security expertsSource: National Cyber Security – Produced By Gregory Evans You have health insurance, car insurance, homeowner’s insurance, how about cyber insurance?   More and more local businesses are buying protection for themselves from huge financial losses in a cyber-attack.   Cyber protection is a fairly new offering in the insurance industry.  But one Sioux Falls development company […] View full post on AmIHackerProof.com | Can You Be Hacked?

How To Look #Back To The #Future Of #Cybersecurity

Source: National Cyber Security – Produced By Gregory Evans

How To Look #Back To The #Future Of #Cybersecurity

As if to cap off an already eventful National Cybersecurity Awareness Month—and perhaps proving that there is no honor among thieves—a hacker breached a forum for hackers last week, and is ransoming fellow cyber-attackers’ user data for $50,000. And there certainly seems to be plenty of occasions to increase our awareness of cybersecurity issues.

About 1.9 billion data records got exposed in the 918 data breaches that occurred in the first half of 2017—up 164 percent from the last half of 2016—according to a digital security firm’s study. The U.S. Department of Homeland Security issued a warning last week about the Bad Rabbit ransomware, which is disrupting government, hospital and other systems internationally. And cybersecurity researchers confirmed last week that an enormous botnet has already infected more than one million organizations—and is on the verge of unleashing “the next cyber-hurricane.”

It’s crucial that we learn from these attacks. And—just as some are using high-tech for cyberattacks—others are using blockchain, artificial intelligence and other cutting-edge technology to improve cybersecurity.

Blockchain, AI, and IoT to the rescue

With so many cyberattacks targeting centralized services, blockchain’s decentralized technology offers cyber-defenses from many types of attacks, according to PC Magazine last week. Among the benefits are blockchain’s transparency and distributed nature, which eliminate the single failure points that many hackers prey upon. But …

“The best defense [organizations] have is the same thing that makes them such an appealing target for hackers: a mountain of data,” PC Magazine stated in a different story last week. “By using machine learning algorithms and other artificial intelligence techniques to identify data patterns, vulnerable user behaviors and predictive security trends, companies are mining and analyzing the wealth of data at their disposal to hopefully stop the next breach from happening.”

However, networks and Internet of Things sensors will still require cybersecurity technology, VentureBeat stated this month. Unsecured devices can be terrible liabilities, so organizations should earnestly evaluate the opportunities and vulnerabilities offered by AI and IoT—and ensure that all users are well trained.

Build a tech-savvy phalanx

Technical savvy helps employees across the organization better understand their work environment and, as a result, operate more securely, according to SmartBrief last week. This will only get more important, as data analytics is increasingly crucial to business success—and as workflow automation continues to get cheaper.

And making rules isn’t enough. For example, in healthcare, HIPAA regulations require that organizations train their workers to maintain patient privacy—and punish those who violate policies and procedures. But employee security awareness is the top healthcare data security concern for 80 percent of health IT executives, according to a 2017 healthcare security study.

“Build a culture of cybersecurity among your executive and physician leaders,” Theresa Meadows, CHCIO, Senior VP and CIO of Cook Children’s Health Care System, stated last month. “Educate them about the threats, myths and importance of good cyber hygiene … they can champion the cause among their peers and staff and get them to buy into safety processes.”

Of course, cybersecurity cultures don’t sprout up overnight.

Learning our lessons

Chief information security officers face the increasingly difficult job of convincing their c-suites that cybersecurity expenditures are worth the big bucks, according to Government Computer News this month. CISOs can use their organizations wealth of data to frame cybersecurity in terms that managers and executives can understand, such as managing risk, business continuity and regulatory compliance.

In short, it’s about taking a step back and learning lessons from the big picture.

“We are so overwhelmed with present security concerns that we don’t have the ability to look into the future — or we hesitate to second guess what cybercriminals might end up doing,” IT Business Edge stated last week. “It’s up to us to recognize what we’ve seen in the past in order to rethink our security solutions of the future.”

And last week’s hacking of the hackers’ forum—as well as other events from this year’s National Cybersecurity Awareness Month—have given us plenty of source material to learn from.

The post How To Look #Back To The #Future Of #Cybersecurity appeared first on National Cyber Security Ventures.

View full post on National Cyber Security Ventures

Look out for bogus BBB emails

Source: National Cyber Security – Produced By Gregory Evans

Better Business Bureaus across the country, including BBB serving the Northwest, have been receiving several calls and messages about emails businesses have been receiving. Scammers are using the BBB name and a logo indicating they have violated various federal laws such as “Fair Labor Standards Act” or “Safety and Health…

The post Look out for bogus BBB emails appeared first on National Cyber Security Ventures.

View full post on National Cyber Security Ventures

Cybersecurity channel chiefs and MSSPs look to the future

Source: National Cyber Security – Produced By Gregory Evans

The cybersecurity market is rife with conferences that feature keynote speakers, industry experts, vendor demos, training sessions, hack-a-thons and professional networking. Some of the best events are centered on a narrowly defined topic, an industry vertical, or a niche technology. And with CyberTechnologyXchange (CTX), we have a new venue focused…

The post Cybersecurity channel chiefs and MSSPs look to the future appeared first on National Cyber Security Ventures.

View full post on National Cyber Security Ventures

If you want to get to grips with cyber security, look at the big picture

Source: National Cyber Security – Produced By Gregory Evans

An integrated architecture can help service providers get the upper hand over the ever-increasing range of cyber security threats I’ve visited RSA, the world’s biggest internet security conference in San Francisco, for the past few years. And it’s really brought home to me how fast the world of cyber security…

The post If you want to get to grips with cyber security, look at the big picture appeared first on National Cyber Security Ventures.

View full post on National Cyber Security Ventures

Look beyond job boards to fill cybersecurity jobs

Source: National Cyber Security – Produced By Gregory Evans

The cybersecurity talent shortage keeps getting worse. According to Cybersecurity Ventures, the cost of cybercrime will double from $3 trillion globally in 2015 to $6 trillion by 2021. Meanwhile, the number of open cybersecurity jobs will increase from 1 million in 2016 to 1.5 million by 2019. Meanwhile, the scale…

The post Look beyond job boards to fill cybersecurity jobs appeared first on National Cyber Security Ventures.

View full post on National Cyber Security Ventures

Google Gmail Restrictions May Force Hackers To Look For New Method Of Malware Distribution

Source: National Cyber Security – Produced By Gregory Evans

Google Gmail Restrictions May Force Hackers To Look For New Method Of Malware Distribution

Google Gmail is getting more serious about cybersecurity matters. Starting next month, Gmail will start blocking Javascript attachments in emails for security reasons. The search engine company made the big announcement on the G Suite Updates Blog. Reduce Malicious Attacks, …

The post Google Gmail Restrictions May Force Hackers To Look For New Method Of Malware Distribution appeared first on National Cyber Security Ventures.

View full post on National Cyber Security Ventures

Why is there so much cyber ‘hacking’ going on right now? Computer Digital Forensics Expert says ‘look closer’.

Source: National Cyber Security – Produced By Gregory Evans

Why is there so much cyber ‘hacking’ going on right now? Computer Digital Forensics Expert says ‘look closer’.

Upon reading the attributed link labelled, “The evolution of hacking” – written by “The Guardian” and listed at the end of this article, Simon Smith, a real practicing certified expert White Hat Ethical Hacker and successful Senior forensic Private Investigator,

The post Why is there so much cyber ‘hacking’ going on right now? Computer Digital Forensics Expert says ‘look closer’. appeared first on National Cyber Security Ventures.

View full post on National Cyber Security Ventures

Dating website reveals Newfoundlanders look to attract a mate with two key words

They may not immediately come across as the sexiest of words to include in your online dating profile, but hear Kimberly Moffit out: Newfoundlanders are making sense when they include “cabin” and “Horton’s” in their attempts to attract a partner online. Moffit is a psychotherapist and a relationship expert with Match, a dating website which recently compiled data on the most popular words used by Canadians in their profiles, by province. Newfoundlanders’ love of coffee was displayed in the spring of 2015 with “Horton’s” (as in the coffee shop chain) topping the list, but that changed to “cabin” last fall. Read More….

The post Dating website reveals Newfoundlanders look to attract a mate with two key words appeared first on Dating Scams 101.

View full post on Dating Scams 101

Schools look to fix social media struggles

social-media-collage200x200

Source: National Cyber Security – Produced By Gregory Evans

Schools look to fix social media struggles

Facebook, Twitter, Instagram — Ridgefield Public Schools is having a more difficult time combating bullying on these social media platforms than in school hallways.
That was the main takeaway from the district’s Comprehensive School Climate Inventory (CSCI) survey that was

The post Schools look to fix social media struggles appeared first on National Cyber Security.

View full post on National Cyber Security