Tag Archives | Information security

Quest Diagnostics Labs Suffer a Data Breach

Quest Diagnostics’ patient data has been accessed by an unauthorized third party, affecting more than 30,000 patients. Like many other breaches, the unauthorized hacker accessed Quest Diagnostics’ data base via the MyQuest via Care360 internet app. Clinical laboratory services company Quest Diagnostics announced Monday that it is investigating a third-party hack into an internet application […]

Read full story Comments { 0 }

Yahoo Discovers ANOTHER Breach

Earlier this year, Yahoo discovered they had a security breach that compromised 500 million user accounts. Within the last few weeks, Yahoo uncovered yet another breach believed to be entirely separate that compromised more than 1 billion user accounts. Yahoo has suffered another hack. The company disclosed today that it has discovered a breach of […]

Read full story Comments { 0 }

Data Breach Costs Continue to Rise

The cost of a data breach has never been something to scoff at, and the rising costs aren’t making it any better. But if costs continue to rise, why aren’t organizations doing more to combat the onslaught of hacking? It’s not easy to pinpoint the total cost of cyber crimes, in part because industrial espionage […]

Read full story Comments { 0 }

The Many Faces of Ransomware

Ransomware has been around for awhile now, but only in 2016 did it start becoming a “household” name and featured in the news. With its big debut also comes evolution – ransomware comes in many different shapes, sizes and families. As the season of evil witches, ghosts, goblins, and ghouls approaches, it’s time to be […]

Read full story Comments { 0 }

Are Millennials Changing the Face of Cybersecurity?

Millennials have now surpassed baby boomers in the work place, and are making their impact known. Although millennials were raised in a digital age, they don’t seem to have the same information security savvy when it comes to both their professional and personal lives. So what does that mean for your organization? According to the […]

Read full story Comments { 0 }

What IoT Devices Mean for InfoSec

The Internet of Things (IoT) has been a boon to our society, connecting individuals regardless of time zones and distance, but did we ever stop to think about the privacy and security risks? When last month’s DDoS attacks hit Netflix, Twitter, Spotify, etc., no one would’ve thought to look at connected printers, VoIP phones, webcams, […]

Read full story Comments { 0 }

Ransomware: Beware & Be Prepared!

Ransomware has been popping up in headlines quite a bit lately, and while it’s nothing to scoff at, there’s a few things you can do prepare. First, you can start by learning the basics. Ransomware is an epidemic. Every day more businesses, consumers, government and other organizations are finding their critical data held hostage and […]

Read full story Comments { 0 }

Privacy & Security Certifications – Which Ones Are Right For You?

When it comes to getting privacy or security certifications, there’s a ton of options, but which one is right for you? ISACA, International Association of Privacy Professionals (IAPP), The International Information System Security Certification Consortium ((ISC)2), and the Compliance Certification Board (CCB) are only a few of the associations that offer certifications. If you consider […]

Read full story Comments { 0 }

Shortage of Cybersecurity Professionals

Across the United States, if not internationally, there’s a plethora of unfilled cybersecurity positions; approximately 1 million to be exact. In 2015, there were more than 209k unfilled cybersecurity positions within the United States, Why is there such a shortage, and how do we fix it? All those job openings mean there are a lot […]

Read full story Comments { 0 }

The Evolving Role of the CISO

The world is changing. The threats are changing. The technology is changing. It makes sense that our roles, our titles and our responsibilities are changing as well and information security officers are no different. “Twenty years ago, when businesses began hiring CISOs, business advantage derived from working with data within the organization. Data lived primarily […]

Read full story Comments { 0 }