Roundup: 2021 Energy & Utility Data Breaches and Defenses in the News

Ransomware is evolving. How long until it takes down operational technology? In May 2021, Colonial Pipeline, one of the largest fuel pipelines in the United States, faced a ransomware attack. The company, which transports more than 100 million gallons of gasoline and other fuel daily from Houston to the New York Harbor, shut down work […]

The post Roundup: 2021 Energy & Utility Data Breaches and Defenses in the News appeared first on Security Intelligence.

Continue reading Roundup: 2021 Energy & Utility Data Breaches and Defenses in the News

Data Security: How Data Activity Monitoring Protects Against Ransomware

Ransomware is an attack on your data. Can you say that your approach to preventing ransomware is focused on data? Organizations are becoming more aware of the chaos that ransomware can create — to the tune of $4.62 million in escalation, notification, lost business and response costs, according to the 2021 Cost of a Data […]

The post Data Security: How Data Activity Monitoring Protects Against Ransomware appeared first on Security Intelligence.

Continue reading Data Security: How Data Activity Monitoring Protects Against Ransomware

Internet providers fail to inform Americans about how they use sensitive data for advertising, FTC says

Internet service providers fail to disclose to consumers how they use sensitive data, obscure privacy practices and making it difficult to opt-out of collection, according to a study released Thursday by the Federal Trade Commission. The study signals that telecommunications companies may not escape the agency’s efforts to establish consumer privacy protections, even as platforms like Facebook and Google dominate the conversation. “While several ISPs in our study tell consumers they will not sell their data, they fail to reveal to consumers the myriad of ways that their data can be used, transferred, or monetized outside of selling it, often burying such disclosures in the fine print of their privacy policies,” the report concludes. The report, which the agency ordered in 2019, looked at six of the largest ISPs — AT&T Mobility, Cellco Partnership (Verizon Wireless), Charter Communications Operating, Comcast (Xfinity), T-Mobile US, and Google Fiber — covering 98% of […]

The post Internet providers fail to inform Americans about how they use sensitive data for advertising, FTC says appeared first on CyberScoop.

Continue reading Internet providers fail to inform Americans about how they use sensitive data for advertising, FTC says

Database Security Best Practices: The Essential Guide

In 2021, an F-35 fighter jet is more likely to be taken out by a cyberattack than a missile. In the digital age, the threat of an attack is everywhere and constantly growing. If your company or agency fails to adhere to database security best practices, you risk a lot. Items at risk include your […]

The post Database Security Best Practices: The Essential Guide appeared first on Security Intelligence.

Continue reading Database Security Best Practices: The Essential Guide

Why virtual desktops make sense for a virtual workforce

Across the country businesses and public agencies alike are holding virtual job fairs and summits and talking about the effects of the virtual workforce. Faced with skilled labor shortages and the pandemic-driven move to remote working, the public and … Continue reading Why virtual desktops make sense for a virtual workforce

Most employees believe backing up company data is not their problem

Apricorn announced the findings from a Twitter poll exploring data backup and recovery processes. More than 50 percent of respondents noted that they, or their employees, have experienced a loss of data as a result of not backing up, or a failed backup… Continue reading Most employees believe backing up company data is not their problem

What Happens to Information After a Data Breach?

We’ve grown accustomed to it by now — a few million accounts broken into here, another hundred million there. After a company data breach, what happens to all the data? Where does it go? And how does this impact your vulnerability analysis? In June 2020, stolen Facebook user data suddenly popped up for sale on […]

The post What Happens to Information After a Data Breach? appeared first on Security Intelligence.

Continue reading What Happens to Information After a Data Breach?

What Is the True Cost of a Health Care Data Breach?

The health care industry has remained the top data breach target for eleven years in a row. Highly sensitive and personally identifiable information (PII) held by health care systems is an attractive target. After all, it contains all the information used for identity theft. In addition, that data may be stored on less secure networks […]

The post What Is the True Cost of a Health Care Data Breach? appeared first on Security Intelligence.

Continue reading What Is the True Cost of a Health Care Data Breach?

What Is Data Protection and Why Does it Matter?

Data is at the center of business. For many organizations, digital adoption drives strategy. Data is essential to meeting customer needs, responding to sudden market shifts and unforeseen events. That’s why data protection should be on your mind. Enterprises generate large amounts of data from multiple sources. The sheer volume and detail of enterprise data […]

The post What Is Data Protection and Why Does it Matter? appeared first on Security Intelligence.

Continue reading What Is Data Protection and Why Does it Matter?

What You Need to Know About Data Security Heading into 2022

Every business needs an effective data security strategy. Over the past year alone, 64% of companies worldwide faced some form of cyber attack, with an average cost of $4.24 million per breach — the highest ever recorded.  Modern enterprises must ensure that their systems can resist unauthorized access, stop data breaches and remain secure (while […]

The post What You Need to Know About Data Security Heading into 2022 appeared first on Security Intelligence.

Continue reading What You Need to Know About Data Security Heading into 2022