6 Potential Long-Term Impacts of a Data Breach

A data breach can destroy a business. For small- and medium-sized businesses (SMB), this is really especially concerning, as 60% will shut down within six months of the attack. While larger companies and agencies likely won’t have to shut their doors, they, too, suffer serious consequences. There are financial costs, which Ponemon Institute and IBM […]

The post 6 Potential Long-Term Impacts of a Data Breach appeared first on Security Intelligence.

Continue reading 6 Potential Long-Term Impacts of a Data Breach

Your Liberal Arts Degree Gives You the Skills for a Cybersecurity Career

Many people don’t realize a liberal arts degree opens the doors for a wide range of careers. That includes careers in cybersecurity. And with the skills gap and the number of available jobs, there is clearly a demand out there. Someone has to step up to fill those jobs. So, why not someone with a […]

The post Your Liberal Arts Degree Gives You the Skills for a Cybersecurity Career appeared first on Security Intelligence.

Continue reading Your Liberal Arts Degree Gives You the Skills for a Cybersecurity Career

Cybersecurity Training: Why You Should Train Employees on Social Media Discretion

A few years ago, I was invited on a behind-the-scenes tour of the security operations of a well-known Las Vegas casino. Before we could enter, however, we had to turn off our phones and put them away. No pictures, we were told, because it could reveal information that would jeopardize casino security. The casino staff […]

The post Cybersecurity Training: Why You Should Train Employees on Social Media Discretion appeared first on Security Intelligence.

Continue reading Cybersecurity Training: Why You Should Train Employees on Social Media Discretion

The CISO and the C-Suite: How to Achieve Better Working Relations

As the workforce moved from the cubicle desk to the dining room table in 2020, cybersecurity suddenly became everyone’s concern. Focus turned to the chief information security officer (CISO). It’s their job to keep businesses running and secure. In many companies, that also meant juggling a move to a full digital transformation with effective remote […]

The post The CISO and the C-Suite: How to Achieve Better Working Relations appeared first on Security Intelligence.

Continue reading The CISO and the C-Suite: How to Achieve Better Working Relations

Health Care Interoperability: What Are the Security Considerations?

Anyone who has needed to schedule an appointment with a new doctor or meet with a specialist knows the hassle of making sure everyone in the health care chain has access to your health records. Digital record-keeping has made that a little easier, but that access still isn’t universal. Digital health care interoperability can still […]

The post Health Care Interoperability: What Are the Security Considerations? appeared first on Security Intelligence.

Continue reading Health Care Interoperability: What Are the Security Considerations?

How to Protect Against Deepfake Attacks and Extortion

Cybersecurity professionals are already losing sleep over data breaches and how to best protect their employers from attacks. Now they have another nightmare to stress over — how to spot a deepfake.  Deepfakes are different because attackers can easily use data and images as a weapon. And those using deepfake technology can be someone from […]

The post How to Protect Against Deepfake Attacks and Extortion appeared first on Security Intelligence.

Continue reading How to Protect Against Deepfake Attacks and Extortion

What’s Behind the Leaks of Customer Data From Retailer Databases?

Retail data breaches involving customer data happen often today. However, they tend to be smaller insize than health care, finance or government breaches. So, the general public notices them less. Yet, they happen more often than realized. Why? And how can you defend against them?  Human Error in Customer Data Theft All types of retail […]

The post What’s Behind the Leaks of Customer Data From Retailer Databases? appeared first on Security Intelligence.

Continue reading What’s Behind the Leaks of Customer Data From Retailer Databases?

New CISA Blacklist: What It Means For You

Everyone makes mistakes once in a while. Maybe not all the time, but who hasn’t reused a password or ignored a software update? But any time someone ignores security best practices adds to your risk. The Cybersecurity and Infrastructure Security Agency (CISA) recognizes these risks and has released a Bad Practices page on its website. […]

The post New CISA Blacklist: What It Means For You appeared first on Security Intelligence.

Continue reading New CISA Blacklist: What It Means For You

How AI Prevents Fatigue After Data Breaches

I have data breach fatigue. Every day, my inbox is flooded with dozens of emails about the newest data breaches and what causes them. Five years ago, I took note of every company listed and the mistakes made that led to the breach. Today, I barely skim them. How many times can I read that a […]

The post How AI Prevents Fatigue After Data Breaches appeared first on Security Intelligence.

Continue reading How AI Prevents Fatigue After Data Breaches

Developing Best Practices for API Security

APIs are pivotal to the overall success of a digital transformation. They allow developers to work across the digital assets and across multiple systems with ease. More organizations are adopting API initiatives, and are approaching digital transforma… Continue reading Developing Best Practices for API Security