Data Security

September 19, 2016
Comments [0]

You’re busy, so I’ll say this fast and loud: DON’T OPEN UNEXPECTED ZIP FILES THAT ARRIVE AS EMAIL ATTACHMENTS. Suddenly, there are a lot of them around.

That advice is nearly as old as email, but as they say, everything old is new again. And the internet is newly awash in spam sending out booby-trapped zip file attachments. My inbox has seen a steady trickle of the stuff for the past couple of months, but I didn’t think much of...

Read More
September 15, 2016
Comments [0]

Register now to discover how your financial institution can minimize data breach threats—and attract and retain customers—with the right planning.

Combating Cyber and Breach Threats for Financial Services LeadersTuesday, Sept. 2711:00 a.m. PT, 12 p.m. MT, 1 p.m. CT, and 2:00 p.m. ET

Data breaches...

Read More
September 12, 2016
Comments [0]

The most active players in the fledgling but fast-growing cyber insurance market are hustling to differentiate themselves.

The early adopters and innovators are doing so by accelerating the promotion of value-added services—tools and systems that can help companies improve their security postures and thus reduce the likelihood of ever filing a cyber damages claim.

As more businesses look to...

Read More
September 1, 2016
Comments [0]

Hollywood and news media will have you think of cyber criminals as an innovative lot, coming up with new, sophisticated ways to steal data that are just beyond the reach of security best practices.

But the reality is much more mundane. More often than not they are exploiting vulnerabilities that are well-known, according to the 2016 Verizon Data Breach Investigations Report.  And the compromise of business...

Read More
August 31, 2016
Comments [0]

Falling victim to identity theft can be an unsettling experience. Many people don’t know where to begin to restore their good name and credit, what to do or who to call.

With more than 13 million identity theft victims a year, there’s a good chance this crime could impact customers. Be sure to let them know there are five important steps to take when identity theft strikes:

File a police report – This is... Read More
August 26, 2016
Comments [0]

This might be the most sophisticated job scam I’ve ever seen. Thanks to a near-victim, you’ll get a rare chance to see a real pro almost pull off a nearly perfect digital caper.

You do things when you are job hunting that you wouldn’t normally do. You meet strangers. You share a lot of personal information with the world, on resumes and through job sites. You’re vulnerable. And most critically: You generally need money. It’s a...

Read More
August 24, 2016
Comments [0]

After years of extorting individual consumers on a global scale, ransomware  purveyors have turned their attention to much bigger fish: businesses.

For years, now, ransomware extortionists have profited handsomely from locking up the computer screens of millions of consumers with scams to sell bogus $79 antivirus cleanup services.

Now fresh intelligence from consultancy Deloitte, networking...

Read More
August 23, 2016
Comments [0]

By Travis Smith

Ransomware is becoming one of the most profitable areas of cyber crime.

In the past, cyber criminals would steal data, and then re-sell it. With ransomware, they block access to an individual or organization’s data by encrypting it, then selling the data’s owner a decryption key to regain access.

And with the rise of hard-to-trace currency,...

Read More
August 21, 2016
Comments [0]

A company’s customer information is an asset, although it’s probably not a line item on its balance sheet. It may be sold during the sale of the business, during a merger, or in a bankruptcy proceeding. However, its sale may be limited by the company’s website privacy notice.

A website privacy notice announces to the world how your organization will collect, receive and use information provided by customers. It also may...

Read More
August 19, 2016
Comments [0]

Sometimes a glitch is more than a glitch. Sometimes, that glitch grinds much of the country to a halt. And it gets the company involved hauled in front of Congress to explain itself.

Recent airline techno-disasters at Delta and Southwest—and United last year—have made one thing clear: Systems designed to keep America moving in the air are far too fragile. Are they just too old?

...

Read More

Offer 24/7 CyberScout Protection

CyberScout's partnership options help you safeguard the identity and privacy of your policyholders, customers, members and employees. Discover how a customized program can help build brand loyalty, customer retention, and quickly generate long-term recurring revenue.

Get Started