Cyber Security Archive
Earlier this year, the SEC (Securities and Exchange Commission) issued a proposal that would impose new cybersecurity requirements on a range of organizations. Under the plans, broker-dealers, clearing agencies, major security-based swap participants, the Municipal Securities Rulemaking Board, and other …
Rulemaking for the May 2023 CMMC (Cybersecurity Maturity Model Certification) is on track to start within the next few weeks. Rather than moving ahead, becoming formally compliant with NIST 800-171/CMMC v2 Level 2, many U.S. DIB (defense industrial base) organizations …
Data breach notification requirements are complex in the US, with various federal and state laws containing different requirements for when security incidents must be disclosed. Some even have substantially different definitions for what a ‘data breach’ or ‘personal data’ is. …
CEO fraud, also known as whaling, is a sophisticated form of phishing in that targets an organization’s senior employees. More than 400 businesses are targeted by CEO fraud each day, with losses totalling almost $1 billion per year. Although the …
The Cyber Kill Chain is a popular framework that’s used for understanding and responding to information security incidents. It outlines the steps that organizations can take to trace the stages of a cyber attack, from a criminal’s reconnaissance efforts to …
It’s a question that’s being asked alarmingly often among organizations these days: how do we respond to this data breach? Cyber crime has skyrocketed in recent years, with businesses processes increasingly being conducted online, which has opened the door for …
Organizations in the U.S. spent $9.44 million on average responding to cyberattacks last year, according to a Ponemon Institute report. This figure is more than double the global average, which leads us to ask why things are so bad in the …
Given the current state of the information security industry, there shouldn’t be any doubt that organizations must prioritize effective defence measures. According to one report, there were more than 1,000 publicly disclosed security incidents last year, while the average cost …
Your company has just been hacked. Awaiting you is hundreds of hours of work putting your network back together, investigating the damage, and dealing with affected customers. After all that, you may well have to defend a multimillion-dollar lawsuit. Now …
The world is more reliant on technology than ever. We spend much of our lives online, and whenever we hand over our personal information, we are at risk of a breach. Although data security is important everywhere, it’s especially so …