Newsletter June 7, 2017

[cs_content][cs_section bg_image=”https://deltarisk.com/wp-content/uploads/2016/12/newsletter_feature1.jpg” bg_color=”hsl(0, 65%, 15%)” parallax=”false” separator_top_type=”none” separator_top_height=”50px” separator_top_angle_point=”50″ separator_bottom_type=”none” separator_bottom_height=”50px” separator_bottom_angle_point=”50″ class=”feature_banner_interior” style=”margin: 0px;padding: 0 0px;”][cs_row inner_container=”false” marginless_columns=”false” style=”margin: 0px auto;padding: 0px;”][cs_column fade=”false” fade_animation=”in” fade_animation_offset=”45px” fade_duration=”750″ type=”1/1″ style=”padding: 0px;”][cs_text]

INFOSECURITY NEWSLETTER

[/cs_text][/cs_column][/cs_row][/cs_section][cs_section parallax=”false” separator_top_type=”none” separator_top_height=”50px” separator_top_angle_point=”50″ separator_bottom_type=”none” separator_bottom_height=”50px” separator_bottom_angle_point=”50″ style=”margin: 0px;padding: 45px 0px;”][cs_row inner_container=”true” marginless_columns=”false” style=”margin: 0px auto;padding: 0px;”][cs_column fade=”false” fade_animation=”in” fade_animation_offset=”45px” fade_duration=”750″ type=”2/3″ style=”padding: 0px;”][cs_text]

June 7, 2017

[/cs_text][cs_text]

5 Incident Response Practices that Keep Enterprises From Adapting to New Threats

Liz Maida, Helpsecurity.com, May 30, 2017

Security analysts within enterprises are living a nightmare that never ends. 24 hours a day, their organizations are being attacked by outside (and sometimes inside) perpetrators – hackers, hacktivists, competitors, disgruntled employees, etc. Attacks range in scope and sophistication, but are always there, haunting the security teams tasked with guarding against them.[/cs_text][x_button size=”global” block=”false” circle=”false” icon_only=”false” href=”https://www.helpnetsecurity.com/2017/05/30/incident-response-practices/” title=”” target=”blank” info=”none” info_place=”top” info_trigger=”hover” info_content=””]Read More[/x_button][x_line style=”border-top-width: 1px;”][cs_text]

Cyber Handyman Skill #5: Tools to Run Basic Vulnerability Scans

Matthew Kuznia, Deltarisk.com, June 2, 2017

Throughout our blog series, 5 DIY Cyber Security Skills Every IT Professional Needs to Master, we have looked at skills and tools that are useful for cyber handy men and women. Much like being able to use a hammer, screwdriver, drill, or saw, having the ability to use virtualization, nmap , understand code, and the command line enables many other DIY tasks.[/cs_text][x_button size=”global” block=”false” circle=”false” icon_only=”false” href=”https://deltarisk.com/blog/cyber-handyman-skill-5-tools-to-run-basic-vulnerability-scans/” title=”” target=”blank” info=”none” info_place=”top” info_trigger=”hover” info_content=””]Read More[/x_button][x_line style=”border-top-width: 1px;”][cs_text]

Think You Know Ransomware? Take a Cybersecurity Quiz

Courtney Linder, Post-gazette.com, May 25, 2017

Ten minutes, one hour, four hours, click. Postpone that annoying Windows update. Avoiding that dreaded dialogue box that pops up on the screen twice a day is a no-brainer for many American employees who don’t want to restart their computers and install a software patch. But in terms of cybersecurity , what seems like an immaterial decision can quickly become a pipeline for hackers and a major expense for companies.[/cs_text][x_button size=”global” block=”false” circle=”false” icon_only=”false” href=”http://www.post-gazette.com/business/tech-news/2017/05/25/phishing-scams-2017-ransomware-malware-wannacry-cybersecurity-pittsburgh/stories/201705260150″ title=”” target=”blank” info=”none” info_place=”top” info_trigger=”hover” info_content=””]Read More[/x_button][x_line style=”border-top-width: 1px;”][cs_text]

Securely Managing Employee Turnover: 3 Tips

Greg Kushto, Darkreading.com, June 5, 2017

Sometimes it’s mutual, other times it’s not. Either way, it’s inevitable: employees — entry-level and executive alike — come and go. Unfortunately, we often overlook the risks and vulnerabilities that employee turnover can introduce, particularly from an IT security standpoint. Although disgruntled employees and whistleblowers raise the most alarm, don’t be naive: not every outbound worker is an Edward Snowden or a Chelsea Manning, and risks aren’t limited to bad intentions. [/cs_text][x_button size=”global” block=”false” circle=”false” icon_only=”false” href=”http://www.darkreading.com/careers-and-people/securely-managing-employee-turnover-3-tips-/a/d-id/1329040?” title=”” target=”blank” info=”none” info_place=”top” info_trigger=”hover” info_content=””]Read More[/x_button][x_line style=”border-top-width: 1px;”][cs_text]

Healthcare Cybersecurity Task Force Finds 6 Imperative Areas

Health IT Security Staff, Healthitsecurity.com, June 5, 2017

Evolving healthcare cybersecurity threats are posing even greater risks to the industry, which is why the Health Care Industry Cybersecurity Task Force published a report to “address the growing challenge posed by cyberattacks.” These threats pose significant patient safety issues, and require both the public and private sector to work together to ensure that healthcare systems and patients remain protected, according to ASPR Office of Emergency Management Director of Division of Resilience Steve Curren.[/cs_text][x_button size=”global” block=”false” circle=”false” icon_only=”false” href=”http://healthitsecurity.com/news/healthcare-cybersecurity-task-force-finds-6-imperative-areas” title=”” target=”blank” info=”none” info_place=”top” info_trigger=”hover” info_content=””]Read More[/x_button][x_line style=”border-top-width: 1px;”][cs_text]

PHI Data Breach Leads to $387K OCR HIPAA Settlement

Health IT Security Staff, Healthitsecurity.com, May 24, 2017

St. Luke’s-Roosevelt Hospital Center Inc. (St. Luke’s) settled alleged HIPAA violations from a PHI data breach by paying $387,000 in an OCR HIPAA settlement. Formerly Spencer Cox Center for Health (the Spencer Cox Center), New York-based St. Luke’s specializes in services for individuals living with HIV or AIDS and other chronic diseases. OCR received a complaint in September 2014 that there had been a PHI data breach when St. Luke’s faxed an individual’s information to his employer.[/cs_text][x_button size=”global” block=”false” circle=”false” icon_only=”false” href=”http://healthitsecurity.com/news/phi-data-breach-leads-to-387k-ocr-hipaa-settlement” title=”” target=”blank” info=”none” info_place=”top” info_trigger=”hover” info_content=””]Read More[/x_button][x_line style=”border-top-width: 1px;”][cs_text]

Cybersecurity in an IoT and Mobile World: The Key Trends

Charles McLellan, Zdnet.com, June 1, 2017

The tech world tends to proceed from one era to another in a roughly 10-15 year cycle. So we had the PC era from the 1980s to the mid-1990s, followed by the internet and world-wide web era, and then the post-2007 (iPhone) mobile era. Today’s tech world is dominated by mobile, social networks, the cloud, analytics (including AI and ML) and, increasingly, the Internet of Things (IoT).[/cs_text][x_button size=”global” block=”false” circle=”false” icon_only=”false” href=”http://www.zdnet.com/article/cybersecurity-in-an-iot-and-mobile-world-the-key-trends/” title=”” target=”blank” info=”none” info_place=”top” info_trigger=”hover” info_content=””]Read More[/x_button][x_line style=”border-top-width: 1px;”][cs_text]

Afraid to Report Insider Threats? Here’s How to Avoid the Fear Factor

Noah Powers, Deltarisk.com, May 24, 2017

Imagine the following scenario: you work with a colleague who everyone sees as a problem. This individual complains about the direction of the company, unfair treatment, and even vocalizes personal financial struggles. People have come to expect this kind of negative behavior from him. One day, though, you overhear this disruptive co-worker say something out of the ordinary, even for him.[/cs_text][x_button size=”global” block=”false” circle=”false” icon_only=”false” href=”https://deltarisk.com/blog/afraid-to-report-insider-threats-heres-how-to-avoid-the-fear-factor/” title=”” target=”blank” info=”none” info_place=”top” info_trigger=”hover” info_content=””]Read More[/x_button][x_line style=”border-top-width: 1px;”][cs_text]

Infographic: Almost Half of Companies say Cybersecurity Readiness has Improved in the Past Year

Amy Talbott, Zdnet.com, June 1, 2017

Mobile and IoT-connected devices present special security risks that many companies are still figuring out how to mitigate. ZDNet’s sister site, Tech Pro Research, recently polled IT professionals about the state of cybersecurity in their workplaces. Most seemed to feel that cyberthreats were relatively well controlled. The majority of respondents said their company’s cybersecurity readiness was average or above, and most said it had improved in the past year.[/cs_text][x_button size=”global” block=”false” circle=”false” icon_only=”false” href=”http://www.zdnet.com/article/infographic-almost-half-of-companies-say-cybersecurity-readiness-has-improved-in-the-past-year/” title=”” target=”blank” info=”none” info_place=”top” info_trigger=”hover” info_content=””]Read More[/x_button][x_line style=”border-top-width: 1px;”][/cs_column][cs_column fade=”false” fade_animation=”in” fade_animation_offset=”45px” fade_duration=”750″ type=”1/3″ class=”newslettermain_right” style=”padding: 0px;”][x_image type=”none” src=”https://deltarisk.com/wp-content/uploads/2017/01/financial-right-column.jpg” alt=”financial newsletter” link=”true” href=”/resources/newsletter/financial-newsletter/” title=”” target=”” info=”none” info_place=”top” info_trigger=”hover” info_content=””][x_image type=”none” src=”https://deltarisk.com/wp-content/uploads/2017/01/healthcare-right.jpg” alt=”healthcare newsletter ” link=”true” href=”/resources/newsletter/healthcare-newsletter/” title=”” target=”” info=”none” info_place=”top” info_trigger=”hover” info_content=””][cs_text]

Infosecurity Newsletter Archive

[/cs_text][x_widget_area sidebar=”ups-sidebar-inforsecurity-sidebar” ][x_line style=”border-top-width: 1px;”][x_image type=”none” src=”https://deltarisk.com/wp-content/uploads/2016/12/10pts-mobile.jpg” alt=”top cyber incident pain points ” link=”true” href=”https://deltarisk.com/resources/white-papers/top-10-cyber-incident-pain-points-prepared/” title=”” target=”” info=”none” info_place=”top” info_trigger=”hover” info_content=””][/cs_column][/cs_row][/cs_section][/cs_content]