Examining crisis management for an unprecedented ransomware attack Our last post discussed power grid hacks and the potential they hold to wreak havoc, but what about a real live hack that’s happening now? According to reports, Hollywood Presbyterian Medical center …
Ashley Madison Hack: Many in Sensitive Positions Open to Extortion
Fallout from this case is evidence of dangers from others As predicted, outed Ashley Madison users are being targeted for extortion. Although the reported cases thus far have been of a widespread spam-based attack, it would take very little digging …
Learning from the OPM Data Breach
Doing nothing is not a crisis management strategy that produces results The Office of Personnel Management breach is attracting a lot of attention thanks to the staggering number of federal employees possibly affected – nearly 18 million the last time …
Army.mil Hack – a Reminder of the Need to Prepare
Chances of being the victim of a cyber attack continue to rise While the military has had its share of web issues, it’s still safe to say that its official websites are more secure than your average page. Although there’s …
Reputation and the Financial Sector
Identifying the biggest threat to financial firms’ reputations Reputation is your most valuable asset, and today there are more threats to reputation than ever before. One of the fastest-growing and most impactful issues is information security, and the results of …
Hard Stats on The Cost of Information Crises
How much does an info crisis cost? Data breaches and other information or IT-related crises are expensive. Plugging the hole costs money, you could very well be left paying stakeholders in recompense, and, depending on your level of preparedness, the …
Information Security (or Lack Thereof)
A look at an all-too-common cause of crisis Whether it’s exposing client data or losing corporate secrets to unknown competitors, failing to secure sensitive information can quickly create a crisis. But, despite the high profile examples we’ve seen over the …
Hacking Wi-Fi Networks is Literally Child’s Play
It doesn’t take a hardened criminal to steal your data Public wi-fi networks are everywhere, from coffee shops to entire metro areas. They’re also astoundingly easy to hack. In an eye-opening experiment out of the UK, one security researcher turned …
Guest Post: Cybersecurity Takes Centre Stage as a Crisis Risk
[Editor’s note: The below article, originally published in the Managing Outcomes newsletter, is an excellent look at the hot topic of cybersecurity from our colleague and frequent contributor Tony Jaques.] 2014 was a landmark year for cybersecurity, which saw a …
Crisis Management Risk: Your Apps Have Been Hacked
With convenience comes danger Smartphones have gone far past being a fancy means of communication. They are our bank tellers, our maps, our offices-away-from-the office, and so much more, and all of this increased functionality is made possible by the …
Software As a Cybersecurity Risk
Are the programs you use to work leaving you vulnerable to attack? Publicly held companies are being ranked, both by stakeholders and the SEC, on their ability to prevent and withstand cyber attacks. Although most have put some form of …
Crisis Management Risk – Web Browser Flaws
The prevalence and constant use of web browsers makes then an ideal point of entry for malicious hackers In case the many recent posts to this blog covering cyber crimes haven’t made it clear, at this point it’s not a …
Military Crisis Management for Cyber Threats
U.S. Cyber Command a solid model for businesses to follow The hacks and breaches of the past several years have made clear to us that cyber crime is here to stay, and that plans to prevent and mitigate the damage …
Jonathan Bernstein on the Sony Hack and Next Steps
Can the movie studio recover, and if so, how? The Sony Hack is an unprecedented event that could very easily become the new norm. After all, hackers have proven their ability to penetrate just about any system they want time …
IBM Study, Cyber Attacks, and Crisis Management
More data from IBM researchers on the current state of system security The past several years have seen a near-constant stream of data breaches, hacks, and other cyber-intrusions that have left individuals and organizations in some seriously sticky spots. While …
- Page 1 of 2
- 1
- 2