How to Prepare for and Respond to a Data Privacy Breach

Before I started covering cybersecurity, I thought the term ‘breach’ had a single meaning — that an attacker stole data from a computer system. I also thought all the different versions of the word meant the same thing. However, I’ve since learned the nuances and differences between a breach, a data breach and a data […]

The post How to Prepare for and Respond to a Data Privacy Breach appeared first on Security Intelligence.

Continue reading How to Prepare for and Respond to a Data Privacy Breach

Cybersecurity Needs to Work Even When Employees Aren’t on Board

Goldman Sachs leadership didn’t get the response they expected from their return to the office (RTO) order. In fact, Fortune reported that only about half of the company’s employees showed up. With today’s tight labor market and many employers allowing remote work, employees have firm ground to stand on. How do you secure a workforce […]

The post Cybersecurity Needs to Work Even When Employees Aren’t on Board appeared first on Security Intelligence.

Continue reading Cybersecurity Needs to Work Even When Employees Aren’t on Board

20 Years Ago in Cybersecurity: Massive DDoS Attack Hits the Roots of the Internet

It was considered the “largest ever” internet attack in 2002. This distributed denial of service attack hit seven of the 13 servers at the top of the internet’s domain name system hierarchy. Now, 20 years later, its origins remain mysterious, but its methods and size still make it stand out. It isn’t the largest by […]

The post 20 Years Ago in Cybersecurity: Massive DDoS Attack Hits the Roots of the Internet appeared first on Security Intelligence.

Continue reading 20 Years Ago in Cybersecurity: Massive DDoS Attack Hits the Roots of the Internet

5 Ways to Retain More Cybersecurity Professionals at Your Organization

Companies that have low retention rates are likely to increase their risk of a cybersecurity attack. The recent ISACA’s State of the Cybersecurity Workforce study found that 69% of respondents whose companies faced more attacks in the past year report being somewhat or very understaffed. However, retention is becoming a bigger challenge. The report also […]

The post 5 Ways to Retain More Cybersecurity Professionals at Your Organization appeared first on Security Intelligence.

Continue reading 5 Ways to Retain More Cybersecurity Professionals at Your Organization

One Size Does Not Fit All Organizations

Often, when you read about cybersecurity, the advice appears to be ‘one size fits all’. People recommend the same things, regardless of if the business is two people in a home office or a global group with 100,000 employees. In some ways, the underlying concepts of cybersecurity are the same for all companies. However, the […]

The post One Size Does Not Fit All Organizations appeared first on Security Intelligence.

Continue reading One Size Does Not Fit All Organizations

How to Respond to Non-Malicious Data Breaches

It’s easy to assume most, if not all, data breaches are malicious. Surely, attackers strike on purpose. However, almost two-thirds of data breaches start from mistakes, not an intent to cause harm. According to the Cost of Insider Threats Report from Ponemon, negligent employees create around 62% of security incidents, costing an average of $307,111 […]

The post How to Respond to Non-Malicious Data Breaches appeared first on Security Intelligence.

Continue reading How to Respond to Non-Malicious Data Breaches

62% of Surveyed Organizations Hit By Supply Chain Attacks in 2021

You’ve heard more about the supply chain in the past two years than you ever expected, or likely wanted. But, as a cybersecurity professional, you now have even more reason to pay attention besides not being able to get your favorite products at the grocery store. The apps used to develop software and run the […]

The post 62% of Surveyed Organizations Hit By Supply Chain Attacks in 2021 appeared first on Security Intelligence.

Continue reading 62% of Surveyed Organizations Hit By Supply Chain Attacks in 2021

SEC Proposes New Cybersecurity Rules for Financial Services

Proposed new policies from the Securities and Exchange Commission (SEC) could spell changes for how financial services firms handle cybersecurity. On Feb. 9, the SEC voted to propose cybersecurity risk management policies for registered investment advisers, registered investment companies and business development companies (funds). Next, the proposal will go through a public comment period until […]

The post SEC Proposes New Cybersecurity Rules for Financial Services appeared first on Security Intelligence.

Continue reading SEC Proposes New Cybersecurity Rules for Financial Services

Technologies Useful In the Pandemic Are Challenging Privacy Now

Your company likely made many quick decisions back in March 2020. As an IT leader, you provided the tools employees needed to stay productive while working remotely. It had to happen now or sooner. Your team made it possible for the business to continue moving forward during the pandemic. It was not easy. But you […]

The post Technologies Useful In the Pandemic Are Challenging Privacy Now appeared first on Security Intelligence.

Continue reading Technologies Useful In the Pandemic Are Challenging Privacy Now

What Are the Biggest Phishing Trends Today?

According to the 2022 X-Force Threat Intelligence Index, phishing was the most common way that cyber criminals got inside an organization. Typically, they do so to launch a much larger attack such as ransomware. The Index also found that phishing was used in 41% of the attacks that X-Force remediated in 2021. That’s a 33% […]

The post What Are the Biggest Phishing Trends Today? appeared first on Security Intelligence.

Continue reading What Are the Biggest Phishing Trends Today?