Data Security

September 12, 2017
Comments [0]

Cyber attacks on small and midsize businesses are on the rise. To compound the problem, SMBs are becoming the favorite target of cyber attackers thanks to their lack of security protection.

The unpreparedness of small businesses makes for ...

Read More
September 11, 2017
Comments [0]

Tax identity theft and related fraud are putting high net worth individuals, executives and other business professionals at great risk. With more than $4 billion in potential damage tallied through fraudulent returns in 2016 alone, tax identity theft is a serious problem affluent families and corporate leaders must confront in order to avoid life disrupting events.

Why scammers continue to thrive

... Read More
September 11, 2017
Comments [0]

By now you've heard the bad news: Equifax, one of three major consumer credit reporting agencies, reported a breach that potentially exposes the sensitive data—including driver's licenses and Social Security numbers—of 143 million American consumers.

Breaches unfortunately have become a daily occurrence, but this is a massive event. The takeaway? You need to prepare and take action now to protect your good name and credit.

Follow these steps from our experts at CyberScout:...

Read More
August 16, 2017
Comments [0]

Following on the heels of the two globe-spanning ransomware worms, the HBO hack—with its distinctive blackmail component—rounds out a summer of extortion-fueled hacks and destruction and theft of valuable data at an unprecedented scale.

WannaCry and Petya raced around the planet demanding ransoms after locking up servers at hundreds of organizations. The HBO hackers pilfered 1.5 terabytes of intellectual property and business...

Read More
August 10, 2017
Comments [0]

In the past couple of years, third-party risk has grown from a topic only discussed by cybersecurity circles to a companywide concern. The tipping point may have been in 2014 when Target’s point-of-sale (POS) system was compromised, and the details of 110 million in-store customers were stolen.

How did the hackers do it? They were able to embed ...

Read More
August 7, 2017
Comments [0]

If you work in Maine, Arizona, Texas or Alabama, you have a greater chance of malware encounters than in other states. Researchers with Malwarebytes found that geographic location matters when it comes to who gets targeted for malware attacks. These states have a higher rate of industries most often targeted for malware, including aerospace, automotive, health care, technology and oil and gas.

What’s more, geographic location...

Read More
July 27, 2017
Comments [0]

As we have seen in the headlines, insider threats are a constant challenge for government agencies. But the problem comes with one silver lining. Each time a successful insider threat strikes, it pushes agencies to bolster their cybersecurity programs. The National Industrial Security Program Operating Manual (NISPOM) Change 2 is an example of just that...

Read More
July 24, 2017
Comments [0]

As prices come down, virtual private networks (VPNs) are becoming a must-have tool for many small and medium-size business owners. The growing popularity is a reflection of the chaotic times in enterprise computing, marked by malware and ransomware targeting vulnerable systems and a decentralized work force of globetrotting employees juggling several gadgets at once.

More SMB data is now stored in the cloud, too, often leaving...

Read More
July 24, 2017
Comments [0]

Medical devices, such as such as pacemakers, insulin pumps and defibrillators, could become lethal in the hands of a hacker tampering with them remotely.

 A new study that shows medical devices—and patients—are vulnerable to cyber attacks is a wake-up call for manufacturers, according to a Silicon Valley software company that sponsored the study.

“Device...

Read More
July 20, 2017
Comments [0]

What happened?

A new ransomware attack created computer chaos worldwide—though primarily in Europe —on June 27. The outbreak, dubbed both GoldenEye and Petya by researchers, is being compared to WannaCry. While antivirus firms and IT departments struggle to get the outbreak under control, there’s still some debate about how it works and how it spreads. But in some ways, the virus is even more powerful, and more nasty, than WannaCry.

The list of victims is...

Read More

Offer 24/7 CyberScout Protection

CyberScout's partnership options help you safeguard the identity and privacy of your policyholders, customers, members and employees. Discover how a customized program can help build brand loyalty, customer retention, and quickly generate long-term recurring revenue.

Get Started