ProtectComplyThrive
IT Governance USA Blog
  • About Us
  • Visit our Web Store
  • Menu
  • Blog Home
  • Business Continuity
  • Cyber Security
    • ISO 27001
    • NYSE Guides
    • Risk Management
  • Data Protection
  • IT Best Practice
    • ITIL/ITSM/ISO 20000
    • Project Management
  • IT Governance
    • COBIT
  • PCI DSS
  • Other Blogs

What Is CEO Fraud? Definition, Examples and Prevention

Luke Irwin March 23, 2023
CEO fraud, also known as whaling, is a sophisticated form of phishing in that targets an organization’s senior employees. More than 400 businesses are targeted by CEO fraud each day, with losses totalling almost $1 billion per year. Although the …
[Continue Reading...]

What Is the Cyber Kill Chain? Definition & Explanation

Luke Irwin March 16, 2023
The Cyber Kill Chain is a popular framework that’s used for understanding and responding to information security incidents. It outlines the steps that organizations can take to trace the stages of a cyber attack, from a criminal’s reconnaissance efforts to …
[Continue Reading...]

US Government Releases National Cybersecurity Strategy

Luke Irwin March 9, 2023
The US government has released a national cybersecurity strategy that will shift the burden of responsibility for data protection towards software vendor and service providers. “We must rebalance the responsibility to defend cyberspace by shifting the burden for cybersecurity away …
[Continue Reading...]

Responding to a Data Breach in 5 Simple Steps

Luke Irwin March 2, 2023
It’s a question that’s being asked alarmingly often among organizations these days: how do we respond to this data breach? Cyber crime has skyrocketed in recent years, with businesses processes increasingly being conducted online, which has opened the door for …
[Continue Reading...]

GoDaddy Investigates a Series of Cyber Attacks on Its Infrastructure

Luke Irwin February 23, 2023
GoDaddy is investigating a series of attacks on its infrastructure that it first learned about following customer complaints late last year. Website owners said that their sites were redirecting visitors to random domains in what later transpired to be a …
[Continue Reading...]

Reddit Data Breach Is a Lesson on Handling Phishing Attacks

Luke Irwin February 16, 2023
When an organization suffers a cyber attack, two types of judgment soon follow: a regulatory review and a public trial, with online commentators condemning the victim’s security practices and its ineffective response. But Reddit has flipped the script, being universally …
[Continue Reading...]

3 Things Organizations Must Do to Boost Their Cybersecurity in 2023

Luke Irwin February 9, 2023
Organizations in the U.S. spent $9.44 million on average responding to cyberattacks last year, according to a Ponemon Institute report. This figure is more than double the global average, which leads us to ask why things are so bad in the …
[Continue Reading...]

ISO 27001 Implementation Challenges – And How to Overcome Them

Chloe Biscoe February 2, 2023
Auditor
Given the current state of the information security industry, there shouldn’t be any doubt that organizations must prioritize effective defence measures. According to one report, there were more than 1,000 publicly disclosed security incidents last year, while the average cost …
[Continue Reading...]

How you can get involved in Data Privacy Day

Luke Irwin January 26, 2023
This Saturday marks Data Privacy Day, an international event that raises awareness about the risks when sharing our personal information online. Although many of us are broadly aware that organizations often our personal data can used in a variety of …
[Continue Reading...]

Attorney–Client Privilege and Data Breaches

William Gamble January 19, 2023
Your company has just been hacked. Awaiting you is hundreds of hours of work putting your network back together, investigating the damage, and dealing with affected customers. After all that, you may well have to defend a multimillion-dollar lawsuit. Now …
[Continue Reading...]
  • ← Older posts

    Social Media

    Recent Posts

    • What Is CEO Fraud? Definition, Examples and Prevention
    • What Is the Cyber Kill Chain? Definition & Explanation
    • US Government Releases National Cybersecurity Strategy
    • Responding to a Data Breach in 5 Simple Steps
    • GoDaddy Investigates a Series of Cyber Attacks on Its Infrastructure

    Categories

    • Business Continuity
    • CCPA
    • Cyber Security
      • CMMC
      • ISO 27001
      • NYSE Guides
      • Risk Management
    • Data privacy
    • Data Protection
      • #BreachReady
    • EU GDPR
    • HIPAA
    • IT Best Practice
      • ITIL/ITSM/ISO 20000
      • Project Management
    • IT Governance
      • COBIT
    • News
    • NIS Directive
    • NIST
    • NY Cybersecurity Requirements
    • NYDFS
    • Other Blogs
      • Book Reviews
      • Breaches and Hacks
      • Guest Posts
      • Podcasts
      • Product Blog
      • Quiz
      • Technical Experts
      • Training
    • PCI DSS
    • Penetration Testing
    • Phishing
    • SOC 2
    • Uncategorized
      • State data privacy laws
IT Governance USA Blog Copyright © 2023.