April 24, 2014

Information Security Scams This Christmas

Photo courtesy of adsadvance.co.uk

With the holiday season upon us once again, our staff would like to focus some of your attention on some information security concerns regarding the likely use of digital devices as each of us try to make our Christmas buying lists and plans for upcoming holiday festivities.  Our point is that for every Santa there is a Grinch, and a cybercriminal is most likely waiting in the wings to turn all that holiday cheer into fast cash as he spreads his scams and malware. To help you stay protected as you search high and low both on and offline for the perfect presents for your loved ones, McAfee … [Read more...]

Webinar Presents 2014 Security Predictions

You can jump start security plans of your organization’s information security preparedness team by having them listen to this year’s one (1) hour Websense® 2014 Security Predictions webcast and report on Tuesday, Dec 3, 2013 at 10:00 a.m. PST. In 2012. the Websense Security Labs™ researchers accurately predicted: (a) a surge in Java exploits would disrupt operations worldwide, (b) that employees would be besieged by spear-phishing emails and (c) that cybercriminal attacks would use mobile devices more creatively.  They also explained how to prevent cyber-criminals from stealing your … [Read more...]

Free Cyber Security Awareness and Training Courses Offered by DHS/FEMA Partnership with Texas A&M University.

Cybersecurity from blog by DHS

Just recently, our staff was made aware of a program offering free cyber security related training and awareness courses.  These courses are funded by DHS/FEMA in cooperation with the Texas A&M Engineering Extension Service (TEEX). The objective of this DHS/FEMA partnering is to ensure that cyber space is supported by secure and resilient infrastructure(s) ---delivering open communications, information and prosperity while protecting privacy and confidentiality. These courses are offered at no cost and students can earn a TEEX certification of completion and Continuing Education … [Read more...]

IT Security Threats and Attacks Quantified by New Ponemon Institute Report

Photo courtesy of transfirst.com

A newly recently report, entitled “First Annual Cost of Failed Trust Report: Threats and Attacks”, has just been released.  This report presents research from the Ponemon Institute and was underwritten by Venafi.  The objective of this report is to provide the first extensive examination of how failure to control trust (in IT security keys and certificates) in the face of new and evolving threats is placing all global enterprises at risk. Every business and government relies on cryptographic keys and certificates to provide trust for critical electronic communications.  These technologies … [Read more...]

Security vs. Privacy and the Insider Threat — Free Webinar Offering

Many of our readers are aware of recent stories about data breaches, IP theft, and fraud in the news.   In addition, they have become more aware of so many companies now realizing that background checks and interviews are not foolproof --- and even more importantly, they are realizing that there are times when the greatest threat to an organization is on the inside of that organization. Join Mike Tierney and security expert Alan Shimel on Thursday, September 12, 2013 at 2:00 PM EST, as they discuss the unique challenges associated with detecting and preventing insider threats. Because an … [Read more...]

Wireless Network Security Tested in a Unique Way

Photo courtesy of holyroodpr.co.uk

Wireless network security levels were tested recently in Edinburgh Scotland by a cyclist who “war-biked” around the capital trying to find unsecured wireless networks which could be exploited by hackers. Security expert James Lyne utilized a bike equipped with dynamos and solar panels to power a computer which scans for wireless networks which have no or poor security. As our readers well know, hackers can join wireless networks and then become totally capable of directly attacking those computers and other devices to steal money or information. They can also track which websites you … [Read more...]

E-Discovery Newsletter of Notable Cases and Events

Photo courtesy of  ediscoverylawreview.com

In its ongoing effort to provide current and relevant updates regarding developments in the field of e-discovery, our staff would like to recommend a reading of the Sidley Austin LLP firm's current newsletter written by its in-house “E-Discovery Task Force” group. This group from Sidley Austin LLP works to stay abreast of the shifting legal landscape surrounding e-discovery. The most current update addresses the following recent developments and court decisions involving e-discovery issues: 1. A Northern District of Illinois ruling sanctioning a defendant company for failing to … [Read more...]

Cyber Risk Management App Offers Help in Keeping Ahead of the Curve in a Rapidly Changing Cyber Threat Landscape

Courtesy of desirulez.net

As one of the risk management options mentioned in an earlier cyber insurance related posting on this website, our staff would like to recommend the CyberEdge Mobile App for the iPad to cyber security risk management team members where you work. AIG “Cyber Risk Report 2013 This CyberEdge Mobile App was developed by the American International Group, Inc. (AIG) in response to a recent AIG survey and report, where it was found that 80% of executives and brokers find it very difficult – if not sometimes nearly impossible – to keep pace with defending against and mitigating risk related to cyber … [Read more...]

NIST Offers Free Download of SP 800-53, Rev 4

Photo courtesy of www.livehacking.com

The National Institute of Standards and Technology (NIST) has now made available the Final Release of SP 800-53 Revision 4, Security and Privacy Controls for Federal Information Systems and Organizations – representing the most comprehensive update to the security controls catalog since its inception in 2005. This update was motivated primarily by the expanding occurrences of cyber security threats – looking at the increased sophistication of those cyber-attacks; the growing frequency of such attacks; the professionalism of the attackers, and the persistence of targeting by … [Read more...]

Online Privacy Rights Remain Under Attack and Unresolved Issues for Many in 2013

Cyber Security

In a recent article, posted by PC World and written by Melissa Riofrio, the topic of online privacy for individuals was addressed in the light of growing threats to that privacy predicted for 2013. And, while a debate may exist about the meaning of privacy between different generations of individuals, the fact is that the data any individual generates on the internet is still a rich trove of information that says more about you than you may realize --- not to mention that it is also a tempting target for marketers and law enforcement officials alike. This year, your online privacy faces … [Read more...]