What the SEC Has Signaled to Public Companies About Cybersecurity
Innovation Enterprise |
Historically, cyberattack consequences have ranged from reputation damage to strained partner relationships to heightened investments in IT and security. Increasingly, however, companies must also consider legal and regulatory consequences.
How to Weed the Bad Links Out of Your Inboxes
Security Today |
While malicious links are not a new cyberthreat, this tactic remains a pervasive and effective hacking technique. For instance, with the Meltdown and Spectre vulnerabilities recently threatening billions of computers, many people, urgent to find information and solutions, clicked a link that arrived unsolicited in their inboxes, purportedly from the German Federal Office for Information Security. The link appeared legitimate and promised to provide a defense strategy. Instead, the very malware that those users were trying to avoid was installed on their computers.
Cybersecurity: Why an Ounce of Prevention Equals a Pound of Cure
Not surprisingly, consumers these days are wary, especially those who have had their personal information exposed in the past. But public sentiment is only one of the many ramifications of a cybersecurity (or repeated cybersecurity) failure. From profits to public fallout, cyberattacks have always been costly, but these costs are now more consequential than ever.
How to promote accessibility in healthcare cybersecurity
Healthcare Business & Technology |
The healthcare industry suffers a cybersecurity conundrum: While effective healthcare administration depends on the efficient exchange of this information with trusted vendors and other third parties, employees are often a source of security vulnerability.
How Bad PR Can Kill Your Business (and How to Avoid It)
In the age of social media, the speed at which bad news can spread makes it tough for businesses to manage a crisis. However, it's crucial that your organization have a set plan in place to prevent negative situations -- or, if necessary, deal with issues when they arise.
A Nuclear Response to Cyberattacks? Comprehensive Defense Is a Better Approach
Most of the world hopes there’s never a nuclear response to anything. Yet, the fact that the Pentagon is considering the nuclear option in the event of a cyberattack indicates the growing sophistication and risk underpinning modern cyberwarfare. The Pentagon has issued a report highlighting possible updates to the Nuclear Posture Review, which details the circumstances under which the U.S. will consider responding to an attack with nuclear force.
Why Healthcare Is A Top Target For Hackers
Health IT Outcomes |
The healthcare field is currently in a precarious position. New technologies promise to improve care and increase the success of outcomes with far greater consistency. But those same technologies create vulnerabilities and invite cyberthreats that put every one of those agendas in jeopardy. U.S. Health and Human Services’ Office for Civil Rights believes the final number of cyberattacks in 2017 will far outpace 2016’s figure.
Three keys to a multi-layer security strategy
Health Data Management |
The cybersecurity landscape is more threatening than ever, and healthcare is an industry under attack. According to a report from Symantec, healthcare providers face the second highest rate of incidents, with ransomware propelling the number of attacks forward.
What the Apple Face ID Hack Tells Us About Future Cyberattacks
One of the flashiest and most sophisticated features of Apple’s $1,000 iPhone X is Face ID. In addition to being fun and futuristic, Apple touted this as a way to significantly upgrade security over the more commonly used passwords or Touch ID. But within days of hitting the market, the phone’s facial recognition technology had been hacked.
How To Make Email Security Central To Your Cybersecurity Strategy In 2018
Information Security Buzz |
2017 was another watershed year for cybersecurity. The breaches at Equifax and Yahoo! stand out for their size, but the more troubling development is how much more targeted attacks have become. The HBO attack showed us that hackers are willing to focus on valuable intellectual property or private conversations and hold them hostage for a hefty ransom. The continued attention on the Democratic National Committee hack also revealed that hackers have political agendas that can transcend financial motives.