dcsimg

Tips to Protect Office 365 Data Against Ransomware

Ransomware remains a formidable threat to organizations worldwide. According to a recent survey conducted by Bitdefender, 75% of respondents experienced up to 5 attacks in the last 12 months alone, and organizations accounted for 42% of all ransomware infections. Though cyber-criminals have always targeted Microsoft products, the rapid growth in the popularity of Office 365 has made it a #1 target … [Read more...]

Ransomware VS Cryptojacking

Cryptojacking is a relatively new technique which enables cyber-criminals to illegally “mine” cryptocurrencies on both vulnerable web servers and unsuspecting users’ devices. Cryptocurrency mining is the process by which cryptocurrency “coins” are created. In simple terms, miners use computational resources to perform calculations, which involve iterating through billions of random inputs, … [Read more...]

The Hidden Costs of a Ransomware Attack

When considering the costs associated with a ransomware attack, we tend to assume that the greatest expense is paying the actual ransom. However, this isn’t necessarily the case. There are a number of hidden costs relating to things like forensic investigations, restoring backups, down-time, damage to reputation, lawsuits and fines. It should be noted that it’s generally not a good … [Read more...]

Why it is Important to Know Where Your Data Flows

Under the GDPR, organizations are required to institute measures that enable them to closely monitor the movement of personal data throughout its life-cycle. They must establish a profound understanding about how and why sensitive data is being processed and stored. It would be inadmissible for companies to not know where their valuable physical assets are located. Yet, despite being referred to … [Read more...]

What CISOs Can Learn from the Yahoo Data Breach Fine

In April of this year, the U.S. Securities and Exchange Commission (SEC) released the news that Yahoo! (Altaba) have agreed to settle a $35 million fine for failing to publicly disclose a data breach within an acceptable time limit. This is fairly historic, as it is the first time that the SEC have enforced a financial punishment for this sort of failure, claiming that it broke numerous federal … [Read more...]

HIPAA: The Difference Between the Privacy and Security Rules

The Health Insurance Portability and Accountability Act (HIPAA) was first put in place in 1996 and developed to be the standard for ensuring the protection of sensitive patient data. It is divided into two separate rules that work in conjunction with each other to ensure maximum protection; the Security rule and the Privacy rule. The Difference Between HIPAA Privacy and HIPAA Security Both the … [Read more...]

14 Mistakes Companies Make in Preparation for GDPR

I think it’s fair to say that most organizations are still struggling to understand exactly what is required of them when it comes to GDPR preparations. There is a lot of misinformation out there surrounding this topic and it can be easy to just ignore the mandate and keep your fingers crossed that it will all be OK. Obviously, this is not the way to go about it. We’ve had … Read more … [Read more...]

Healthcare & Public Administration Still Plagued by Insider Threats

According to the 2018 Verizon Data Breach Investigations Report, healthcare “is the only industry vertical that has more internal actors behind breaches than external”. Healthcare service providers have come under a lot of scrutiny in recent times due to repeatedly failing to protect the data they hold. While such scrutiny is both understandable and ultimately necessary, healthcare providers have … [Read more...]

How Would Your Organization Fare if Faced with This Data Security Issue?

This blog is based on a true story – names have been changed to protect the innocent. Late one Friday afternoon Nigel, a Senior Executive, gets a panicked phone call from the Head of Customer Services, Steve. Steve says one of his regular customers is on the phone claiming Steve’s company are the source of a breach that has led to his credit card details being fraudulently used. The customer … [Read more...]

Have You Left It Unlocked with The Keys In?

If you were placed in charge of your boss’ Ferrari, you’d make damn sure you knew where the keys were at all times. If anyone asked to so much as look at the car, you’d be on edge and watching them closely. You’d make sure it was always somewhere safe. You wouldn’t leave the keys in the staff canteen unguarded, and you certainly wouldn’t let the new hire in the … Read more … [Read more...]