Data Security

August 19, 2016
Comments [0]

Sometimes a glitch is more than a glitch. Sometimes, that glitch grinds much of the country to a halt. And it gets the company involved hauled in front of Congress to explain itself.

Recent airline techno-disasters at Delta and Southwest—and United last year—have made one thing clear: Systems designed to keep America moving in the air are far too fragile. Are they just too old?

...

Read More
August 18, 2016
Comments [0]

 

Pick a subject, any subject, and there are myths and pure nonsense that someone will buy into.

Birds will die if they eat the uncooked rice flung at newlyweds. (Nope) If you eat Mentos and drink Diet Coke simultaneously your stomach will explode. (Hardly) You only have one credit score. (Wrong) Napoleon was short. (At 5’ 6”, his height was... Read More
July 28, 2016
Comments [0]

In the words of President Obama, it's "fair to say this is not your typical election." Though he was speaking of the choice Americans must make between two very different candidates come November, they also apply to the role cyber security is playing in the election and the way it is shaping the conversation about data protection.

U.S. intelligence agencies have "high confidence" that the Russian government played a role in the...

Read More
July 19, 2016
Comments [0]

There is a major disconnect, on a number of levels, between information security officers ready to purchase cyber liability coverage and the insurance brokers and underwriters eager to meet that demand.

That’s the big takeaway from a new study by security think tank The SANS Institute and insurance industry researcher ...

Read More
July 18, 2016
Comments [0]

Owners of small and midsize businesses routinely take into account the risk of a fire burning down the building, or a customer or employee getting hurt on company property.

But what about exposure to botnets, data thieves, cyber scammers, hacktivists and disgruntled insiders?

Data is the new currency, and because SMBs now routinely collect, store and access sensitive and valuable data across...

Read More
July 5, 2016
Comments [0]

By Roger Yu

In July 2015, a hacker who goes by the name of Phineas Fisher breached an Italian technology company that, ironically, sells spying and hacking software tools.

Fisher exfiltrated more than 400 gigabytes from the company, called Hacking Team, and declared that his motive was to stop its “abuses against human rights.”

“That’s the beauty and...

Read More
June 29, 2016
Comments [0]

By Roger Yu

Most company senior executives and board members have no clue how to gauge the full scope of financial trauma engendered by a major network breach.

How does one calculate the value of lost trust of customers who take their patronage elsewhere after a well-publicized cyber attack, for instance?

Lost future sales generally are not accounted for in calculating cyber attack costs. A lack of planning for such variables potentially could cost companies...

Read More
June 25, 2016
Comments [0]

How bad has the ransomware problem become? The state auditor of Ohio held a news conference because local government agencies keep falling for ransomware attacks. And a firm that tracks domain activity found a 3,500 percent increase in ransomware-related domain name registrations in the past quarter. Hackers love to cut and paste, so imitation is the surest sign that something is working.

Recall the high-profile, alarming...

Read More
June 14, 2016
Comments [0]

How prepared are you to deal with cyber threats? Is your organization’s email security sophisticated enough to detect and deflect the best spear-phishing or whaling attacks? Do you feel confident you are safe—or as safe as you can be?

The answers to these questions often are torn between your perceptions of security and the reality of it. This gap between the two exposes some major vulnerabilities, ranging from how much of an...

Read More
May 25, 2016
Comments [0]

By Roger Yu

Payroll. Customer relationship management. Employee benefits.

These are a few of the common cost-of-doing-business functions most companies must expense and which many have chosen to outsource.

You can add network security to that list. In the digital age, all companies must come to grips with rising exposures to criminal hacking; and many,...

Read More

Offer 24/7 CyberScout Protection

CyberScout's partnership options help you safeguard the identity and privacy of your policyholders, customers, members and employees. Discover how a customized program can help build brand loyalty, customer retention, and quickly generate long-term recurring revenue.

Get Started