Feb 15, 2020 | Applications, Attack Vectors, Business, Business Email Compromise, Compliance, Corporate Reputation, credential stealing, Cyber Liability, cyberattacks, Cybersecurity, CyberTraining, Employees, Executives, Extortion, Hacking, Hacks, Human Element, ID Theft, Incident Response, Intellectual Property Theft, Internet, Intricate Data Systems, Market Value, News, Patching, Policies and Procedures, Radio Show, Radio_Show, Ransomware, Ransomware, Regulatory Compliance, Security, Security Alerts, Social Engineering, Technology, third-world, Updates
Ransomware rings adapt to business declarations by Revealing Stolen Data Did you know that backups may no longer help you recover from Ransomware? Ransomware is rapidly infecting businesses across the world. Even the most prepared organization have found themselves...
Aug 17, 2019 | Backup, Best Practices, Business, Cyber breaches, Cyber Insurance, Cybercrime, Cybersecurity, CyberTraining, Data, Data Storage, Encryption, Hacking, Legal, Radio Show, Radio_Show, Regulatory Compliance, Security, Security, Security Assessments
Your Cyber Insurance Policy Probably Won’t Pay Out More businesses are recognizing the need for cyber insurance as part of an overall security strategy. Here are some key points to consider when evaluating, purchasing, and relying on a policy. After years of...
Mar 19, 2019 | 2019, Breaches, February
Who: Dr. DeLuca & Dr. Marciano Eye # of Accounts Breached: 23, 578 patients When it happened: November 29, 2018 What Happened: Ransomware Attack How it happened: Twenty-five of the clinic’s computer monitors went unresponsive the morning of Nov. 29 due to a...