The Digital World is Changing Fast: Data Discovery Can Help

The rise in digital technology is creating opportunities for individuals and organizations to achieve unprecedented success. It’s also creating new challenges, particularly in protecting sensitive personal and financial information. Personally identifiable information (PII) is trivial to manage. It’s often spread across multiple locations and formats and can be challenging to find and classify. Organizations need […]

The post The Digital World is Changing Fast: Data Discovery Can Help appeared first on Security Intelligence.

Continue reading The Digital World is Changing Fast: Data Discovery Can Help

Cost of a Data Breach: Retail Costs, Risks and Prevention Strategies

Whether it’s online or brick-and-mortar, every new store or website represents a new potential entry point for threat actors. With access to more personally identifiable information (PII) of customers than most industries, bad actors perceive retail as a great way to cash in on their attacks. Plus, attackers can duplicate attack methods more easily since […]

The post Cost of a Data Breach: Retail Costs, Risks and Prevention Strategies appeared first on Security Intelligence.

Continue reading Cost of a Data Breach: Retail Costs, Risks and Prevention Strategies

Incident Response for Health Care IT: Differences and Drivers

Threat actors continue to target the health care industry. IBM’s Threat Intelligence Index for 2022 rates the industry as the sixth most targeted. That puts it close behind the energy and retail and wholesale sectors. Certain regions seem to be more prone to attack as well. The Asia-Pacific region accounted for 39% of all health […]

The post Incident Response for Health Care IT: Differences and Drivers appeared first on Security Intelligence.

Continue reading Incident Response for Health Care IT: Differences and Drivers

How to Prepare for and Respond to a Data Privacy Breach

Before I started covering cybersecurity, I thought the term ‘breach’ had a single meaning — that an attacker stole data from a computer system. I also thought all the different versions of the word meant the same thing. However, I’ve since learned the nuances and differences between a breach, a data breach and a data […]

The post How to Prepare for and Respond to a Data Privacy Breach appeared first on Security Intelligence.

Continue reading How to Prepare for and Respond to a Data Privacy Breach

Russian indicted, added to ‘Most Wanted’ in cybercrime market case

Igor Dekhtyarchuk allegedly ran the cybercrime forum Marketplace A, which specialized in stolen credit card data and website logins.

The post Russian indicted, added to ‘Most Wanted’ in cybercrime market case appeared first on CyberScoop.

Continue reading Russian indicted, added to ‘Most Wanted’ in cybercrime market case

‘Freedom Convoy’ donors exposed in possible cyberattack on GiveSendGo crowdfunding site

Christian crowdfunding website GiveSendGo is offline Monday due to an apparent hack after the company vowed to fight a Canadian court order to stop disbursing donated funds to a trucker convoy protesting COVID-19 measures in Canada. Sunday the website redirected to a domain “givesendgone[.]wtf” which showed a video from the Disney film frozen alongside a message condemning donors, the Daily Dot’s Mikael Thalen reported. As of Monday morning, the GiveSendGo site delivered an error message. The attackers also appear to have leaked donor information, including names, email addresses, zip codes and IP addresses, according to hacktivist group DDoSSecrets, which obtained the unsecured files. The Canadian protestors belong to a larger global “Freedom Convoy” protest movement by truckers seeking the end of vaccine and mask mandates. The protests have caused a state of emergency in parts of Ottawa, where protestors have been accused of aggressive and illegal behavior by law enforcement. The […]

The post ‘Freedom Convoy’ donors exposed in possible cyberattack on GiveSendGo crowdfunding site appeared first on CyberScoop.

Continue reading ‘Freedom Convoy’ donors exposed in possible cyberattack on GiveSendGo crowdfunding site

The Best Threat Hunters Are Human

“You won’t know you have a problem unless you go and look.” Neil Wyler, who is known as ‘Grifter’ in the hacker community, made that statement as a precursor to an unforgettable story. An organization hired Grifter to perform active threat hunting. In a nutshell, active threat hunting entails looking for an attacker inside an […]

The post The Best Threat Hunters Are Human appeared first on Security Intelligence.

Continue reading The Best Threat Hunters Are Human

Hospital Ransomware Attacks Go Beyond Health Care Data

The health care industry has been on the front lines a lot lately. Along with helping control the effects of COVID-19, it has been a prime target for ransomware. In a 2021 survey conducted of 597 health delivery organizations (HDOs), 42% had faced two ransomware attacks in the past couple of years. Over a third […]

The post Hospital Ransomware Attacks Go Beyond Health Care Data appeared first on Security Intelligence.

Continue reading Hospital Ransomware Attacks Go Beyond Health Care Data

What Is the True Cost of a Health Care Data Breach?

The health care industry has remained the top data breach target for eleven years in a row. Highly sensitive and personally identifiable information (PII) held by health care systems is an attractive target. After all, it contains all the information used for identity theft. In addition, that data may be stored on less secure networks […]

The post What Is the True Cost of a Health Care Data Breach? appeared first on Security Intelligence.

Continue reading What Is the True Cost of a Health Care Data Breach?