January 24, 2018
In today’s threat landscape, it isn’t a question of if you’ll experience an incident, but when. When a security incident strikes, you’ll need a well-prepared staff and with a battle-tested plan. A mature incident response plan keeps everyone on the same page. Join our incident response experts for a 45-minute webinar to learn how you can quickly contain the impact of a breach, resolve an incident, and get back to business as quickly as possible.
John LeBrecht, deltarisk.com, January 18, 2018
It’s a new year, but ransomware incidents show no signs of going away soon. Organizations continue to be faced with a tough dilemma: pay the ransom, or rely on contingency plan to regain access to critical files and systems. Hancock Health is the latest organization to pay the ransom. Infected by the SamSam ransomware, the Indiana-based hospital spent $55,000 to get their systems up and running again, despite having backups.
Steve Ragan, csoonline.com, January 21, 2018
Allscripts, the billion-dollar electronic health record (EHR) company headquartered in Chicago, IL said they were still working to recover from a ransomware attack that left several applications offline after data centers in Raleigh and Charlotte, NC were infected on Thursday.
Nick Ismail, information-age.com, January 22, 2018
The sophistication and volume of cyber attacks had led to a severe increase of corporate fraud. In fact, it has led to an all-time high of corporate fraud impacting organisations across the world. Levels of corporate fraud have climbed since 2012, but 86% of companies around the world reported that they had experienced at least one cyber incident in 2017.
Jay Jay, scmagazineuk.com, January 22, 2018
A large cache of sensitive medical records handled by a US-based digital records management company was found stored in an Amazon S3 storage bucket without adequate protection.The storage bucket containing sensitive medical records could be accessed by anyone possessing the unique URL name associated with the bucket. According to security researchers, there are proprietary tools available in the market that can decipher unique URL names associated with Amazon S3 storage buckets.
Help Net Security Staff, helpnetsecurity.com, January 23, 2018
Globally, cybercrime victims share a similar profile: they are everyday consumers who use multiple devices whether at home or on the go, but have a blind spot when it comes to cyber security basics. This group tends to use the same password across multiple accounts or share it with others. Equally concerning, 39 percent of global cybercrime victims despite their experience, gained trust in their ability to protect their data and personal information from future attacks and 33 percent believe they had a low risk1 of becoming a cybercrime victim.
VPN Mentor Staff, vpnmentor.com, January 20, 2018
As more and more of our data is digitized or contained on the cloud, the danger of being hacked is growing exponentially. Have a look at the worst personal data breaches ever and make sure you haven’t already fallen prey to some of these nightmares.
CPA Practice Advisor Staff, cpapracticeadvisor.com, January 22, 2018
Internal controls over financial reporting (ICFR) and cyber security risks are growing concerns for executives responsible for reporting corporate financial performance, says a new survey by U.S. audit, tax and advisory firm KPMG LLP.Asked what kept them up at night, topping the executives’ list was ICFR (30 percent, compared to 21 percent in 2016) and cyber security (22 percent, compared to just 13 percent in 2016), according to a survey of more than 500 executives at KPMG’s 27th Annual Accounting and Financial Reporting Symposium.
Joe Kim, gcn.com, Janaury 18, 2018
The world was a different place when the National Institute of Standards and Technology introduced the first version of its Cybersecurity Framework in 2014. Yes, there were some noteworthy intrusions in the mid-2000s, such as the attack on the Department of Veterans Affairs in 2006. However, when the Framework was issued, some of the most infamous breaches in government history — including the massive hack of the Office of Personnel Management in 2015 — were yet to come.
Danny Palmer, zdnet.com, January 17, 2018
The economic damage of a successful major cyber-attack against a large cloud services provider could be similar in scale to the financial impact of a destructive hurricane. The destructive tropical cyclone hurricane Katrina hit the US in 2005, causing $108bn in damage — but that could be exceeded by the cost of a major cyber-attack, according to one expert.