INFOSECURITY NEWSLETTER

March 8, 2017

Cyber Resilience Is Crucial to Maintaining Brand Reputation

Steve Durbin, Securitymagazine.com, March 2, 2017

Every year, we spend more money and time combatting the dark forces of cyber space: state-sponsored operatives, organized crime rings, and super-hackers armed with black-ops tech. The attack methods mutate constantly, growing more cancerous and damaging. Massive data breaches and their ripple effects compel organizations of every kind to grapple with risk and security at a more fundamental level.

Read More

Top 3 Tips for Building an Effective Cyber Training Program

Devesh Panchwagh, Delta-risk.net, March 2, 2017

Identifying and matching organizational roles with the correct cyber security training content is critical, but it is also important to manage programs at every step to get maximum value from them. Program management means ensuring your training objectives match organizational roles, and following up training with practice runs and refreshers to keep specific skill sets sharp.

Read More

Safeguarding Data Before Disaster Strikes

Larry Novak, Cloudtweaks.com, February 28, 2017

Online data backup is one of the best methods for businesses of all sizes to replicate their data and protect against data loss in the event of an IT outage or security incident. While online backup services offer many benefits, they are just one step in protecting your business from having to declare a disaster. You can’t neglect to also have a broader disaster recovery plan in place to ensure that policies and protocols are followed when interruptions occur.

Read More

1.37 Billion Records Leak After Spammers Forgot to Password-Protect Backups

Darlene Storm, Computerworld.com, March 6, 2017

Nearly 1.4 billion people are affected by a database records leak caused by spamming group River City Media (RCM) forgetting to password-protect their backups.

Read More

Fileless PowerShell Malware Uses DNS as Covert Channel

Lucian Constantin, Computerworld.com, March 3, 2017

Targeted attacks are moving away from traditional malware to stealthier techniques that involve abusing standard system tools and protocols, some of which are not always monitored.

Read More

6 Security Areas Fintech Needs to Patch This Year

Elena Prokopets, Tech.co, March 1, 2017

If there ever was a tech revolution that is impacting every corner of the world, it is fintech. Traditional financial institutions are being forced to re-think their products and services. Previously unbanked individuals are now getting banked through mobile providers. Personal finance management is largely shifting online – you can get insured, invest in stocks or pay your bills through an app.

Read More

Can Kids Harm Your Company’s Cybersecurity?

Jake Anderson, Digitalistmag.com, March 1, 2017

Corporate information technology departments are busy enough without having to worry about hard-core gamers. So when a story is published about how a gamer’s World of Warcraft account has been hacked, most IT professionals would probably ignore the details and return to their own internal cyberdefense issues.
But those professionals can easily miss the risks that a gaming attack might pose to their own systems if the gamer had been using a computer that has also been used to access a company’s network.

Read More


Ransomware Onslaught Continues: Old Foes, New Defenses

Mathew J. Schwartz, Bankinfosecurity.com, March 6, 2017

Indeed, the Crypt0L0cker ransomware – originally tied to the Gameover Zeus gang – has returned, researchers warn, and in some cases is digitally signed to make it appear legitimate. And various attack campaigns continue to spread other types of crypto-locking ransomware, for example fling Cerber and Sage Locker via emails sent from short-lived domain names.

Read More

6 Security Areas Fintech Needs to Patch This Year

Elena Prokopets, Tech.co, March 1, 2017

If there ever was a tech revolution that is impacting every corner of the world, it is fintech. Traditional financial institutions are being forced to re-think their products and services. Previously unbanked individuals are now getting banked through mobile providers. Personal finance management is largely shifting online – you can get insured, invest in stocks or pay your bills through an app.

Read More

79K Patients Affected by Emory Healthcare Data Breach

Warwick Ashford, Healthitsecurity.com, March 02, 2017

Nearly 80,000 patients were potentially impacted by a recent data breach at Georgia-based Emory Healthcare’s Orthopaedics & Spine Center and Brain Health Center (EHC) at Emory Clinic.

Read More
Infosecurity Newsletter Archive

June 2018: 6th

May 2018: 2nd, 9th, 30th

April 2018: 4th, 11th, 18th, 25th

March 2018: 7th, 14th, 21st, 28st

February 2018: 7th, 14th, 21st, 28th

January 2018: 3rd, 10th, 17th, 24th, 31st

December 2017: 6th, 13th, 20th

November 2017: 1st, 15th, 29th

October 2017: 4th, 11th, 18th, 25th

September 2017: 6th, 13th, 20th, 27th

August 2017: 2nd, 9th, 16th, 23rd, 30th

July 2017: 5th, 12th, 19th, 26th

June 2017: 7th, 14th, 21st, 28th

May 2017: 3rd, 10th, 17th, 24th, 31st

April 2017: 5th, 12th, 19th, 26th

March 2017: 1st, 8th, 15th, 22nd, 29th

February 2017: 1st, 8th, 13th, 22nd

January 2017: 4th, 11th, 18th, 24th

December 2016: 7th, 14th, 21st, 28th