Study Finds Security Experts and Regular Users Differ in Approach

Sally Smoczynski, a contributing writer for this website, recently read a story about a Google sponsored survey report which attempted to compare and contrast responses from security experts and non-security expert Internet users regarding what they do to stay safe online. Given that you can find more online security tips in a few seconds than you could use in a lifetime, and, given that security hacks and breaches continue to be a security threat for everyone using the Internet, Smoczynski was convinced that perhaps the results of this survey would be helpful to both her clients and the … [Read more...]

Cloud Computing – {Need to Keep Up with Terminologies}

by: Ben J. Carnevale Cloud computing remains a strong topic of interest for organizations big and small. And, as with many topics and developing technologies concerned with use of the internet, risk management and cyber-security preparedness teams struggle to keep up with the terminology and risk mitigation strategies needed in order to make cloud technologies work successfully and effectively for your organization.   To help that process along, our staff has recommended adding a recent article dealing with “cloud computing terms you need to know” to your organization’s … [Read more...]

Data Breach Costs now Average $154 per Record

In a recently published benchmark research report it was found that executives in 2015 – motivated by growing concerns from ongoing data breaches and other cyber-attacks to their organizations – are now paying greater attention to the security practices of their organizations. To that point, research from that report also indicated that the average total cost of a data breach for the 350 companies participating in this research increased from $ 3.52 to $ 3.79 million US dollars (e.g. a 23% increase in total cost of data breach since 2013). The average cost paid for each lost or stolen … [Read more...]

Is Password Recycling Addressed in Your Information Security Metrics?

                              Maria Deutscher, who is a staff writer for SiliconANGLE, recently reported on the results of a new report from Netskope, Inc. reinforcing perhaps much of what our readers already know – e.g. for many - if not most enterprises - cloud security and security metrics of effectiveness and privacy in the cloud remain a “work-in-progress”. Nonetheless, one of those issues of “work-in-process” is bringing attention to the information security related risks surrounding password recycling. However with that being said, this report … [Read more...]

2014 US State of Cybercrime Survey Report Now Available

Recently, a report entitled the “2014 US State of Cybercrime Survey” was released and made available to the public.  This survey was co-sponsored by PwC, CSO magazine, The CERT® Division of the Software Engineering Institute at Carnegie Mellon University, and the United States Secret Service.  Cybersecurity leaders from these organizations worked together to evaluate survey responses from more than 500 executives of US businesses, law enforcement services, and government agencies where they identified requirements for effective cyber security processes and procedures and evaluated these … [Read more...]

Cyber Intelligence Sharing Website Newly Launched

Our staff would like to bring your attention to the fact that U.S. retailers have recently joined forces and have launched a website called “Retail Cyber Intelligence Sharing Center”. In order to create a structure for this website and to better address the needs of the retail industry, the R-CISC was developed with input from more than 50 of America’s largest retailers, and in consultation with key stakeholders including federal law enforcement, government agencies and subject matter experts. For the record, the R-CISC is an independent organization, the focus of which is a Retail … [Read more...]

Disaster Preparedness Teams Can Benefit from a Recent World Economic Forum 2014 Risks Report

In an earlier posting on this website, our staff published a story reviewing the consensus for listing the threats of 2013 which impacted many organizations.  In this posting, the point addressed is that very often risks of threats or incidents can impact an organization because of the occurrence of some global size event that would appear to be beyond the scope of an organization’s disaster preparedness planning. With that thought in mind, our staff would like you to be aware of a recently released World Economic Forum report which attempts to size up the impact of some all-too-real … [Read more...]

Information Security Scams This Christmas

With the holiday season upon us once again, our staff would like to focus some of your attention on some information security concerns regarding the likely use of digital devices as each of us try to make our Christmas buying lists and plans for upcoming holiday festivities.  Our point is that for every Santa there is a Grinch, and a cybercriminal is most likely waiting in the wings to turn all that holiday cheer into fast cash as he spreads his scams and malware. To help you stay protected as you search high and low both on and offline for the perfect presents for your loved ones, McAfee … [Read more...]

ASIS International — Invitation to Attend World’s Most Influential Security Events

ASIS International has led the security industry by providing up-to-the-minute education and strategic solutions to professionals around the world.  Both physical and information security professionals have benefited from these offerings for nearly sixty (60) years. Our staff supports ASIS International and encourages our readers to be aware of the following schedule of upcoming seminars and exhibits: ASIS-PAC in Macau, China – December 3-5, 2013 ASIS MIDDLE EAST in Dubai, UAE – February 16-18, 2014 ASIS EUROPE in The Hague, Netherlands – April 1-3, 2014 ASIS NYC in New York, … [Read more...]

Context Aware Security: Is It Time for Your Organization to Implement this Approach in Protecting Its Assets?

Has your organization adopted a “context aware” IT security model?  Perhaps, it has adopted a single password model of IT security approach ---and, if it has done so, then as members of your organization’s information and network security team, it is your responsibility to at least consider the benefits of moving beyond an IT security equivalent of “putting all your eggs in one basket” to an IT security model smart enough to add context to a security event. As Leon Ward states in a recently posted article, “…..context aware security is the use of situational information (such as identity, … [Read more...]