Crafting an effective risk register

Crafting an effective risk register

Crafting an effective risk register | 2021-03-15 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses…

Read More

Tips small businesses can use to strengthen their cyber health

Tips small businesses can use to strengthen their cyber health

Tips small businesses can use to strengthen their cyber health | 2021-03-15 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn…

Read More

Disaster Recovery as a Service: What is it and do you need it?

Disaster Recovery as a Service: What is it and do you need it?

Disaster Recovery as a Service: What is it and do you need it? | 2021-03-15 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie…

Read More

What Does the HIPAA Safe Harbor Bill Mean for Your Practice?

What Does the HIPAA Safe Harbor Bill Mean for Your Practice?

Getting incentives for the best security practices is a win-win for all healthcare-related entities. For one, you are getting incentives, and secondly, you are making sure that you have a rock-solid defense in terms of security.  Many organizations find that the rules and regulations that HIPAA entails are too extensive and overwhelming, however. What’s more, cybersecurity wasn’t a thing when HIPAA was introduced. Therefore, the law does not have any specific guidelines for cybersecurity.  The…

Read More

Protect Your Organisation Against the Threat of Magecart – The Steps Towards Mitigation

Protect Your Organisation Against the Threat of Magecart – The Steps Towards Mitigation

By Pedro Fortuna, CTO, Jscrambler Magecart has certainly garnered mainstream media attention over the last couple of years. Perhaps it’s the high profile nature of many of their targets (British Airways, Forbes, Equifax, Macy’s) to name but a few. Magecart is best described as a cybercrime syndicate that specialises in cyberattacks involving digital credit card theft, by skimming online payment forms. And they are not victimless crimes –  hundreds of thousands of customers typically have…

Read More

Threat Roundup for March 5 to March 12 – Cisco Blogs

Threat Roundup for March 5 to March 12 – Cisco Blogs

Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between March 5 and March 12. As with previous roundups, this post isn’t meant to be an in-depth analysis. Instead, this post will summarize the threats we’ve observed by highlighting key behavioral characteristics, indicators of compromise, and discussing how our customers are automatically protected from these threats. As a reminder, the information provided for the following threats in this post is non-exhaustive…

Read More

Hackers stole data from Norway parliament exploiting Microsoft Exchange flaws

Hackers stole data from Norway parliament exploiting Microsoft Exchange flaws

Norway parliament, the Storting, has suffered a new cyberattack, hackers stole data by exploiting recently disclosed Microsoft Exchange vulnerabilities. Norway ‘s parliament, the Storting, was hit by a new cyberattack, threat actors stole data exploiting the recently disclosed vulnerabilities in Microsoft Exchange, collectively tracked as ProxyLogon. On March 2nd, Microsoft has released emergency out-of-band security updates that address four zero-day issues (CVE-2021-26855, CVE-2021-26857, CVE-2021-26858, and CVE-2021-27065) in all supported Microsoft Exchange versions that are actively exploited in…

Read More

AIOps – Use Some Intelligence (Part 1) – VMware Cloud Community

AIOps – Use Some Intelligence (Part 1) – VMware Cloud Community

There are many types of Ops in today’s world of Cloud, from DevOps to GitOps, SecOps to DevSecOps, the list goes on, but AIOps is here to truly enable business innovation. Please check out this video where I explain the background of AIOps, what problems it can help solve and the opportunities for the future. As usual, if you would prefer to read the content, I’ve placed the transcript below. Enjoy! I’d like to follow…

Read More

Settlement Reached Over Data Breach Impacting 24 Million Americans

Settlement Reached Over Data Breach Impacting 24 Million Americans

A multi-state settlement has been reached over a 2019 data breach that may have exposed the personal information of up to 25 million Americans.  The breach took place from August 1, 2018, through March 30, 2019, when an unauthorized user gained access to the internal computer system of the American Medical Collection Agency (AMCA) by hacking into a web payment portal. Once inside the system, the user was able to access a variety of sensitive data that included Social Security…

Read More

Utah Company Stored Passport Scans on Unsecured Server

Utah Company Stored Passport Scans on Unsecured Server

A Utah company has exposed the sensitive information of more than 50,000 customers by storing data on an unsecured server. The breach at Premier Diagnostics was discovered on February 22 by cybersecurity expert Bob Diachenko at consumer privacy watchdog Comparitech. Sensitive customer data stored in a publicly accessible database included scans of passports, health insurance ID cards, and driver’s licenses.  Researchers found that the data of around 52,000 customers may have been impacted in the security incident. Based on the…

Read More
1 3,471 3,472 3,473 3,474 3,475 3,509