Are the programs you use to work leaving you vulnerable to attack? Publicly held companies are being ranked, both by stakeholders and the SEC, on their ability to prevent and withstand cyber attacks. Although most have put some form of security measures in place, the experts at Veracode say software …
Crisis Management Risk – Web Browser Flaws
The prevalence and constant use of web browsers makes then an ideal point of entry for malicious hackers In case the many recent posts to this blog covering cyber crimes haven’t made it clear, at this point it’s not a question of whether you’ll be attacked, but when. A new …
Military Crisis Management for Cyber Threats
U.S. Cyber Command a solid model for businesses to follow The hacks and breaches of the past several years have made clear to us that cyber crime is here to stay, and that plans to prevent and mitigate the damage from these attacks is an absolute must for crisis management. …
Jonathan Bernstein on the Sony Hack and Next Steps
Can the movie studio recover, and if so, how? The Sony Hack is an unprecedented event that could very easily become the new norm. After all, hackers have proven their ability to penetrate just about any system they want time and time again over the past couple of years, and …
IBM Study, Cyber Attacks, and Crisis Management
More data from IBM researchers on the current state of system security The past several years have seen a near-constant stream of data breaches, hacks, and other cyber-intrusions that have left individuals and organizations in some seriously sticky spots. While awareness, preparation, and responsiveness has improved significantly over those years, …
Sony Hack – Proof of the Need to Prepare for Cyber Attacks
Does your crisis management plan include the possibility of a devastating hack? The cyberattack that crippled Sony Pictures, led to theft of confidential data and leak of movies on the internet would have challenged almost any cyber security measures, the US Federal Bureau of Investigation (FBI) has said. The FBI’s …
Cyber Threat – Social Login Attacks
Staying aware of threats is part of any good crisis management plan Social logins, where you use your Facebook, Twitter, Google or other social media accounts to log into apps and platforms around the web, have quickly become a norm. After all, with the mile-long list of passwords and key …
CurrentC Needs Crisis Management after Data Breach
Losing trust before you get off the ground can be devastating Mobile payment is a hot field right now, and it looks like whoever comes out as the clear favorite is going to reap serious benefits. One newcomer to the field, CurrentC, has already encountered a major hurdle in the …
Crisis Management Dangers in “The Cloud”
Should you be trusting cloud storage with valuable data? Storing data in “the cloud” has become enormously popular, yet a lack of understanding about exactly what is okay to store there, and how secure cloud services are, has led to massive security threats becoming commonplace. We would even go so far …
Crisis Management Risk – Smartphone Shipped with Spyware
Data thieves find a new angle of attack The message that downloading suspicious apps can land with you a phone full of malware is finally gaining ground, but what if your phone comes straight from the factory with nasty software already installed? Well, if you ordered a Star N9500 Android …
- Page 2 of 2
- 1
- 2