Data Security

May 13, 2017
Comments [0]

A massive, fast-moving cyber attack has hit as many as 74 countries. The ransomware attack first appeared Friday morning in the United Kingdom and has impacted computer systems at a wide range of organizations including hospitals, telecom, universities and businesses.

According to news reports, the malicious software is a variant...

Read More
May 3, 2017
Comments [0]

The number of records compromised by cyber criminals is skyrocketing, according to findings of digital security giant Gemalto.

The Netherlands-based company says its 2016 Breach Level Index, a global database that tracks data breaches, found nearly 1.4 billion records were compromised worldwide last year—an 86 percent increase over 2015....

Read More
May 2, 2017
Comments [0]

The premature release of the new season of “Orange is the New Black” by hackers is no big deal. Really. You can see why producers made the calculation that stopping the “hack” was not even worth the alleged $66,000 or so the hackers demanded as “ransom,” according to TorrentFreak.

Why?

... Read More
April 27, 2017
Comments [0]

There was at time 15 years ago when we fully expected the latest, coolest software to come riddled with aggravating bugs. Consumers were trained to expect that the software vendor would fix the glitches in version 1.1 or 1.2.

Software developers today remain under more pressure than ever to rush to market with the coolest functionalities. But those that do so create fresh vulnerabilities that cyber criminals pounce on to breach business networks and cause other havoc.

Factor in...

Read More
April 6, 2017
Comments [0]

It’s no secret that cybersecurity has become a more pressing issue over the past decade. According to a PWC Global State of the Information Security Survey in 2015, the number of cybersecurity incidents has increased at an annual rate of 66 percent. Both the range and complexity of cyber threats are expanding—from ransomware to compromises of critical infrastructure.

Yet, when those threats materialize, too few businesses and...

Read More
March 1, 2017
Comments [0]

Small and midsize businesses are increasingly at risk for data breach class action lawsuits that typically have targeted large corporations.

Large companies are learning to address cyber threats. Hackers are responding by setting their sights on SMBs. It’s simply more productive and efficient to attack poorly protected companies that could take weeks or even months to notice they’ve been breached.

The changing litigation landscape

As the risk...

Read More
March 1, 2017
Comments [0]

Despite awareness that hackers are relentlessly launching cyber attacks, most companies say they don’t have a clearly defined risk strategy or one that applies to the entire company, a new survey finds.

The survey, conducted by the Ponemon Institute and sponsored by RiskVision, polled 641 individuals involved in risk management activities within their organizations. More than half held executive and management positions.

“There is a big disparity between awareness and...

Read More
January 23, 2017
Comments [0]

As a partner at the Canadian law firm Borden Ladner Gervais, Éloïse Gratton advises her clients on legal, practical and ethical ways to protect an individual’s privacy while conducting business nationally and internationally. She has testified before Canada’s House of Commons and other federal bodies and conducted training workshops attended by judges and members of the Parliament.

ThirdCertainty sat down with Gratton just after she...

Read More
January 16, 2017
Comments [0]

In the past couple of years there’s been a significant uptick in talk about cyber insurance. This comes as no surprise, as risk has risen well beyond manageable levels and the costs associated with breaches now impact bottom lines. The breach that hit Target in 2013 drove damages that exceeded $290 million. The attack on Sony dismantled the release of a major motion picture and led to the termination of at least one top executive.

...

Read More
January 13, 2017
Comments [0]

Many savvy businesses are investing time and thought into data breach response plans. But plans rarely survive first contact with the enemy. That's why it's important to stress test your incident response plan to find and resolve its weaknesses while time is on your side.

Studies show that a swift response to a security incident retains customer trust—and saves costs. Breaches contained within 30 days of discovery cost an average of $5.24 million. If it takes more than 30 days to...

Read More

Offer 24/7 CyberScout Protection

CyberScout's partnership options help you safeguard the identity and privacy of your policyholders, customers, members and employees. Discover how a customized program can help build brand loyalty, customer retention, and quickly generate long-term recurring revenue.

Get Started