INFOSECURITY NEWSLETTER

March 8, 2017

Cyber Resilience Is Crucial to Maintaining Brand Reputation

Steve Durbin, Securitymagazine.com, March 2, 2017

Every year, we spend more money and time combatting the dark forces of cyber space: state-sponsored operatives, organized crime rings, and super-hackers armed with black-ops tech. The attack methods mutate constantly, growing more cancerous and damaging. Massive data breaches and their ripple effects compel organizations of every kind to grapple with risk and security at a more fundamental level.

Read More

Top 3 Tips for Building an Effective Cyber Training Program

Devesh Panchwagh, Delta-risk.net, March 2, 2017

Identifying and matching organizational roles with the correct cyber security training content is critical, but it is also important to manage programs at every step to get maximum value from them. Program management means ensuring your training objectives match organizational roles, and following up training with practice runs and refreshers to keep specific skill sets sharp.

Read More

Safeguarding Data Before Disaster Strikes

Larry Novak, Cloudtweaks.com, February 28, 2017

Online data backup is one of the best methods for businesses of all sizes to replicate their data and protect against data loss in the event of an IT outage or security incident. While online backup services offer many benefits, they are just one step in protecting your business from having to declare a disaster. You can’t neglect to also have a broader disaster recovery plan in place to ensure that policies and protocols are followed when interruptions occur.

Read More

1.37 Billion Records Leak After Spammers Forgot to Password-Protect Backups

Darlene Storm, Computerworld.com, March 6, 2017

Nearly 1.4 billion people are affected by a database records leak caused by spamming group River City Media (RCM) forgetting to password-protect their backups.

Read More

Fileless PowerShell Malware Uses DNS as Covert Channel

Lucian Constantin, Computerworld.com, March 3, 2017

Targeted attacks are moving away from traditional malware to stealthier techniques that involve abusing standard system tools and protocols, some of which are not always monitored.

Read More

6 Security Areas Fintech Needs to Patch This Year

Elena Prokopets, Tech.co, March 1, 2017

If there ever was a tech revolution that is impacting every corner of the world, it is fintech. Traditional financial institutions are being forced to re-think their products and services. Previously unbanked individuals are now getting banked through mobile providers. Personal finance management is largely shifting online – you can get insured, invest in stocks or pay your bills through an app.

Read More

Can Kids Harm Your Company’s Cybersecurity?

Jake Anderson, Digitalistmag.com, March 1, 2017

Corporate information technology departments are busy enough without having to worry about hard-core gamers. So when a story is published about how a gamer’s World of Warcraft account has been hacked, most IT professionals would probably ignore the details and return to their own internal cyberdefense issues.
But those professionals can easily miss the risks that a gaming attack might pose to their own systems if the gamer had been using a computer that has also been used to access a company’s network.

Read More


Ransomware Onslaught Continues: Old Foes, New Defenses

Mathew J. Schwartz, Bankinfosecurity.com, March 6, 2017

Indeed, the Crypt0L0cker ransomware – originally tied to the Gameover Zeus gang – has returned, researchers warn, and in some cases is digitally signed to make it appear legitimate. And various attack campaigns continue to spread other types of crypto-locking ransomware, for example fling Cerber and Sage Locker via emails sent from short-lived domain names.

Read More

6 Security Areas Fintech Needs to Patch This Year

Elena Prokopets, Tech.co, March 1, 2017

If there ever was a tech revolution that is impacting every corner of the world, it is fintech. Traditional financial institutions are being forced to re-think their products and services. Previously unbanked individuals are now getting banked through mobile providers. Personal finance management is largely shifting online – you can get insured, invest in stocks or pay your bills through an app.

Read More

79K Patients Affected by Emory Healthcare Data Breach

Warwick Ashford, Healthitsecurity.com, March 02, 2017

Nearly 80,000 patients were potentially impacted by a recent data breach at Georgia-based Emory Healthcare’s Orthopaedics & Spine Center and Brain Health Center (EHC) at Emory Clinic.

Read More
Infosecurity Newsletter Archive