January 24, 2018

[Webinar] Data Breach Survival Tactics: Building Actionable Incident Response Plans

In today’s threat landscape, it isn’t a question of if you’ll experience an incident, but when. When a security incident strikes, you’ll need a well-prepared staff and with a battle-tested plan. A mature incident response plan keeps everyone on the same page. Join our incident response experts for a 45-minute webinar to learn how you can quickly contain the impact of a breach, resolve an incident, and get back to business as quickly as possible.

Reserve My Seat

How to Deal with Ransomware in 2018: Mitigate the Damage and Don’t Pay the Ransom

John LeBrecht,, January 18, 2018

It’s a new year, but ransomware incidents show no signs of going away soon. Organizations continue to be faced with a tough dilemma: pay the ransom, or rely on contingency plan to regain access to critical files and systems. Hancock Health is the latest organization to pay the ransom. Infected by the SamSam ransomware, the Indiana-based hospital spent $55,000 to get their systems up and running again, despite having backups.

Read More

Allscripts Recovering From Ransomware Attack That has Kept Key Tools Offline

Steve Ragan,, January 21, 2018

Allscripts, the billion-dollar electronic health record (EHR) company headquartered in Chicago, IL said they were still working to recover from a ransomware attack that left several applications offline after data centers in Raleigh and Charlotte, NC were infected on Thursday.

Read More

Increased Cyber Attacks Leading to Severe Levels of Corporate Fraud

Nick Ismail,, January 22, 2018

The sophistication and volume of cyber attacks had led to a severe increase of corporate fraud. In fact, it has led to an all-time high of corporate fraud impacting organisations across the world. Levels of corporate fraud have climbed since 2012, but 86% of companies around the world reported that they had experienced at least one cyber incident in 2017.

Read More

Sensitive Medical Records on AWS Bucket Found to be Publicly Accessible

Jay Jay,, January 22, 2018

A large cache of sensitive medical records handled by a US-based digital records management company was found stored in an Amazon S3 storage bucket without adequate protection.The storage bucket containing sensitive medical records could be accessed by anyone possessing the unique URL name associated with the bucket. According to security researchers, there are proprietary tools available in the market that can decipher unique URL names associated with Amazon S3 storage buckets.

Read More

Cybercriminals Stole $172 Billion From 978 Million Consumers in the Past Year

Help Net Security Staff,, January 23, 2018

Globally, cybercrime victims share a similar profile: they are everyday consumers who use multiple devices whether at home or on the go, but have a blind spot when it comes to cyber security basics. This group tends to use the same password across multiple accounts or share it with others. Equally concerning, 39 percent of global cybercrime victims despite their experience, gained trust in their ability to protect their data and personal information from future attacks and 33 percent believe they had a low risk1 of becoming a cybercrime victim.

Read More

[Infographic] The Most Shocking Personal Data Hacks of All Time

VPN Mentor Staff,, January 20, 2018

As more and more of our data is digitized or contained on the cloud, the danger of being hacked is growing exponentially. Have a look at the worst personal data breaches ever and make sure you haven’t already fallen prey to some of these nightmares.

Read More

Financial Execs Concerned About ICFR and Cyber Security

CPA Practice Advisor Staff,, January 22, 2018

Internal controls over financial reporting (ICFR) and cyber security risks are growing concerns for executives responsible for reporting corporate financial performance, says a new survey by U.S. audit, tax and advisory firm KPMG LLP.Asked what kept them up at night, topping the executives’ list was ICFR (30 percent, compared to 21 percent in 2016) and cyber security (22 percent, compared to just 13 percent in 2016), according to a survey of more than 500 executives at KPMG’s 27th Annual Accounting and Financial Reporting Symposium.

Read More

The Cybersecurity Framework is Helping Agencies, but There’s Room for Improvement

Joe Kim,, Janaury 18, 2018

The world was a different place when the National Institute of Standards and Technology introduced the first version of its Cybersecurity Framework in 2014. Yes, there were some noteworthy intrusions in the mid-2000s, such as the attack on the Department of Veterans Affairs in 2006. However, when the Framework was issued, some of the most infamous breaches in government history — including the massive hack of the Office of Personnel Management in 2015 — were yet to come.

Read More

Cloud Computing: Why a Major Cyber-Attack Could be as Costly as a Hurricane

Danny Palmer,, January 17, 2018

The economic damage of a successful major cyber-attack against a large cloud services provider could be similar in scale to the financial impact of a destructive hurricane. The destructive tropical cyclone hurricane Katrina hit the US in 2005, causing $108bn in damage — but that could be exceeded by the cost of a major cyber-attack, according to one expert.

Read More

Sign Up for Our Newsletter

financial newsletterhealthcare newsletter
Infosecurity Newsletter Archive

top cyber incident pain points