Cost of a data breach 2023: Healthcare industry impacts

Data breaches are becoming more costly across all industries, with healthcare in the lead. The 2023 Cost of a Data Breach Report analyzes data collected from March 2022 to March 2023. Healthcare remains a top target for online criminal groups. These data breach costs are the highest of any industry and have increased for the […]

The post Cost of a data breach 2023: Healthcare industry impacts appeared first on Security Intelligence.

Continue reading Cost of a data breach 2023: Healthcare industry impacts

Is Patching the Holy Grail of Cybersecurity?

A proactive approach to cybersecurity includes ensuring all software is up-to-date across assets. This also includes applying patches to close up vulnerabilities. This practice minimizes risk, as it eliminates outdated software versions in the process. Does this make patching a catch-all cybersecurity solution? While patching is an important component of cybersecurity, other security solutions and […]

The post Is Patching the Holy Grail of Cybersecurity? appeared first on Security Intelligence.

Continue reading Is Patching the Holy Grail of Cybersecurity?

What “Beginner” Skills do Security Leaders Need to Refresh?

The chief information security officer (CISO) was once a highly technical role primarily focused on security. But now, the role is evolving. Modern security leaders must work across divisions to secure technology and help meet business objectives. To stay relevant, the CISO must have a broad range of skills to maintain adequate security and collaborate with […]

The post What “Beginner” Skills do Security Leaders Need to Refresh? appeared first on Security Intelligence.

Continue reading What “Beginner” Skills do Security Leaders Need to Refresh?

The Role of Human Resources in Cybersecurity

The human resources (HR) department is an integral part of an organization. They work with all departments with a wider reach than even IT. As a highly visible department, HR can support and improve an organization’s security posture through employee training. Their access to employees at the start of employment is an opportunity to lay […]

The post The Role of Human Resources in Cybersecurity appeared first on Security Intelligence.

Continue reading The Role of Human Resources in Cybersecurity

The Role of Finance Departments in Cybersecurity

Consumers are becoming more aware of the data companies collect about them, and place high importance on data security and privacy. Though consumers aren’t aware of every data breach, they are justifiably concerned about what happens to the data companies collect.  A recent study of consumer views on data privacy and security revealed consumers are […]

The post The Role of Finance Departments in Cybersecurity appeared first on Security Intelligence.

Continue reading The Role of Finance Departments in Cybersecurity

The Role of Customer Service in Cybersecurity

The old adage “cybersecurity is everyone’s job” is more true than you might imagine. While not every department is tasked with threat hunting or reviewing detailed vulnerability disclosures, each has a role in protecting the organization from fraudsters and cyber criminals alike. Customer service is uniquely positioned as the face of the company. These departments […]

The post The Role of Customer Service in Cybersecurity appeared first on Security Intelligence.

Continue reading The Role of Customer Service in Cybersecurity

The Role of Marketing and PR in Incident Response

Responding to a cyber incident requires teamwork across departments and disciplines. Technical incident responders must work to halt incoming attacks while the communications teams develop a public response. Clear communication is essential.  Communication strategies differ before and after a cyber incident. The way a company approaches both is as important as incident mitigation itself. How […]

The post The Role of Marketing and PR in Incident Response appeared first on Security Intelligence.

Continue reading The Role of Marketing and PR in Incident Response

The 13 Costliest Cyberattacks of 2022: Looking Back

2022 has shaped up to be a pricey year for victims of cyberattacks. Cyberattacks continue to target critical infrastructures such as health systems, small government agencies and educational institutions. Ransomware remains a popular attack method for large and small targets alike. While organizations may choose not to disclose the costs associated with a cyberattack, the […]

The post The 13 Costliest Cyberattacks of 2022: Looking Back appeared first on Security Intelligence.

Continue reading The 13 Costliest Cyberattacks of 2022: Looking Back

Don’t Wait To Embrace CISA’s Vulnerability Management Rules

Vulnerability management is the time-consuming process of finding and patching a seemingly unlimited number of potential risks. The National Institute of Standards and Technology (NIST) reports more than 23,000 new vulnerabilities for 2022, where more than 17,000 are classified as critical. For many organizations, simply prioritizing vulnerabilities becomes a monumental task on its own. The […]

The post Don’t Wait To Embrace CISA’s Vulnerability Management Rules appeared first on Security Intelligence.

Continue reading Don’t Wait To Embrace CISA’s Vulnerability Management Rules

Emotional Blowback: Dealing With Post-Incident Stress

Cyberattacks are on the rise as adversaries find new ways of creating chaos and increasing profits. Attacks evolve constantly and often involve real-world consequences. The growing criminal Software-as-a-Service enterprise puts ready-made tools in the hands of threat actors who can use them against the software supply chain and other critical systems. And then there’s the […]

The post Emotional Blowback: Dealing With Post-Incident Stress appeared first on Security Intelligence.

Continue reading Emotional Blowback: Dealing With Post-Incident Stress