Hacking Wi-Fi Networks is Literally Child’s Play

It doesn’t take a hardened criminal to steal your data Public wi-fi networks are everywhere, from coffee shops to entire metro areas. They’re also astoundingly easy to hack. In an eye-opening experiment out of the UK, one security researcher turned …

Guest Post: Cybersecurity Takes Centre Stage as a Crisis Risk

[Editor’s note: The below article, originally published in the Managing Outcomes newsletter, is an excellent look at the hot topic of cybersecurity from our colleague and frequent contributor Tony Jaques.] 2014 was a landmark year for cybersecurity, which saw a …

Crisis Management Risk: Your Apps Have Been Hacked

With convenience comes danger Smartphones have gone far past being a fancy means of communication. They are our bank tellers, our maps, our offices-away-from-the office, and so much more, and all of this increased functionality is made possible by the …

Software As a Cybersecurity Risk

Are the programs you use to work leaving you vulnerable to attack? Publicly held companies are being ranked, both by stakeholders and the SEC, on their ability to prevent and withstand cyber attacks. Although most have put some form of …

Crisis Management Risk – Web Browser Flaws

The prevalence and constant use of web browsers makes then an ideal point of entry for malicious hackers In case the many recent posts to this blog covering cyber crimes haven’t made it clear, at this point it’s not a …

Military Crisis Management for Cyber Threats

U.S. Cyber Command a solid model for businesses to follow The hacks and breaches of the past several years have made clear to us that cyber crime is here to stay, and that plans to prevent and mitigate the damage …

Jonathan Bernstein on the Sony Hack and Next Steps

Can the movie studio recover, and if so, how? The Sony Hack is an unprecedented event that could very easily become the new norm. After all, hackers have proven their ability to penetrate just about any system they want time …

IBM Study, Cyber Attacks, and Crisis Management

More data from IBM researchers on the current state of system security The past several years have seen a near-constant stream of data breaches, hacks, and other cyber-intrusions that have left individuals and organizations in some seriously sticky spots. While …

Sony Hack – Proof of the Need to Prepare for Cyber Attacks

Does your crisis management plan include the possibility of a devastating hack? The cyberattack that crippled Sony Pictures, led to theft of confidential data and leak of movies on the internet would have challenged almost any cyber security measures, the …

Cyber Threat – Social Login Attacks

Staying aware of threats is part of any good crisis management plan Social logins, where you use your Facebook, Twitter, Google or other social media accounts to log into apps and platforms around the web, have quickly become a norm. …

CurrentC Needs Crisis Management after Data Breach

Losing trust before you get off the ground can be devastating Mobile payment is a hot field right now, and it looks like whoever comes out as the clear favorite is going to reap serious benefits. One newcomer to the …

Antivirus Maker’s Crisis Management for Data Breach

More proof that nobody is invulnerable to cyber attacks In the last Crisis Manager of 2013, we predicted cyber crises would explode this year, and explode they have. What was once a fringe crime that often went unnoticed by both …