COVID-19 Phishing SCAMS: 5 ways to Protect Your Business

By |2020-06-11T13:49:00-04:00April 23rd, 2020|Cyber-Security, Safety and Cyber Security|

Since the COVID-19 pandemic began, cybercrime has increased by up to 300%. According to cyber security experts, a big part of that increase has come in the form of COVID-19 phishing scams. Now more than ever, organizations must remain hyper-vigilant to protect assets and employees from attack. With many employees working from home (WFH), everyone appears to be a target. With expanded security perimeters, reports of phishing attacks are way up, even within our own organization. Current COVID-19 Phishing Scams The most common COVID-19 phishing scams involve the sinister but effective method of spoofing authoritative sources. Often-spoofed organizations include the

Comments Off on COVID-19 Phishing SCAMS: 5 ways to Protect Your Business

4 Data Governance Tools that Protect and Power Vital Information Assets

By |2020-06-12T10:30:08-04:00April 1st, 2020|Cyber-Security, Data Compliance, Information Governance and Management|

Along with daffodils and Mardi Gras, spring 2020 brought a pandemic that has rocked the global economy and changed daily life. As organizations navigate the crisis, they depend on accurate, accessible and usable data to forecast the future and inform decisions. Data governance tools play an essential role in ensuring that businesses realize the full potential of data. For example, retail businesses need to respond in an agile way to changes in consumer buying habits. With up-to-date data, they can quickly analyze, and even anticipate, those changes. And with more employees working remotely, data governance tools help ensure that the

Comments Off on 4 Data Governance Tools that Protect and Power Vital Information Assets

Coronavirus Phishing Attacks Target Remote Workers

By |2020-06-12T10:32:00-04:00March 24th, 2020|Cyber-Security, Safety and Cyber Security|

Spurred by social distancing orders, the American workforce is returning home. In fact, Netskope Threat Labs reports that 58 percent of users worked remotely last week. This compares with an average of 27 percent prior to the pandemic. Unfortunately, researchers have also recorded a corresponding spike in coronavirus phishing attacks. Cyber criminals love a crisis, from terror attacks to natural disasters. Using emotional appeals and a sense of urgency, they trick users into surrendering sensitive information or unknowingly downloading malware. And most of the time, they use email to launch the attack. Remote Work Raises the Risk While advances in

Comments Off on Coronavirus Phishing Attacks Target Remote Workers

Advancements in Data Encryption Up the Data Defense Game

By |2024-03-12T16:00:46-04:00March 5th, 2020|Cyber-Security, Data Compliance, Technology|

From credit card transactions to online loan applications and sensitive emails, billions of pieces of valuable information cross the internet every hour. Keeping that data safe from unauthorized access requires increasingly sophisticated tools. As the challenges to data security grow more intense, advancements in data encryption rise to meet them. In the movies, messengers transmitted important documents in a briefcase, handcuffed to the messenger’s wrist and accessible only via a key. The messenger made certain that no one tampered with the document during transit and that only the intended recipient opened the briefcase to retrieve and read its contents. Encryption

Comments Off on Advancements in Data Encryption Up the Data Defense Game

Control Mobile Data: Information Governance Essential

By |2020-06-15T11:18:58-04:00January 22nd, 2020|Cyber-Security, Information Governance and Management|

Information governance to control mobile data and reduce the associated costs of eDiscovery becomes essential. One of the biggest and costliest issues facing organizations under legal litigation is the ability to accurately provide electronic records as evidence when requested by the courts in eDiscovery. Organizations either have no idea what email or electronic document data exists in their systems and employee devices or where that data may reside. The Challenge of Mobile Data In today’s global communications environment, electronic messages can circumnavigate the globe in seconds. Messages can exist on cellular telephones, PDA’s, laptops, home computers and backup tapes. And

Comments Off on Control Mobile Data: Information Governance Essential

Healthcare Cyber Security Best Practices to Protect Patient Data in 2020

By |2020-05-22T04:50:59-04:00January 3rd, 2020|Cyber-Security|

In recent years, hackers have turned their attention to healthcare organizations. Not only do hospitals store valuable personal data, but they often underspend on cyber security. This makes them highly attractive targets. Investing in solid healthcare cyber-security protects essential data and ensures regulatory compliance. More importantly, it can quite literally save lives. Late last year, East Ohio Regional Hospital discovered a ransomware attack. Thanks to multi-layer defense systems and reliable backups, the hospital managed to recover with minimal damage. Other hospitals around the country have not proven so lucky. From disruption of services to exposure and loss of critical patient

Comments Off on Healthcare Cyber Security Best Practices to Protect Patient Data in 2020

Improved Customer Experience, Informed Decisions and Compliance from Retail Information Governance

By |2020-05-22T04:04:53-04:00December 26th, 2019|Cyber-Security, Information Governance and Management|

In the retail industry, data reigns. From market analysis to determining the success of a sales promotion, retailers depend on data to inform decisions and guide strategy. But without a way to organize and protect that data, it provides little value and can even prove a significant liability. Retail information governance promotes data quality and security. Consider a typical scenario. A clothing retailer sells merchandise through its brick and mortar store, as well as online. It gathers financial information online and through point-of-sale terminals in the store. Customers submit product reviews and sign up for loyalty programs. Email campaigns and

Comments Off on Improved Customer Experience, Informed Decisions and Compliance from Retail Information Governance

3 Email Security Threats and How to Safeguard Your Business in 2020

By |2020-06-01T09:11:52-04:00December 18th, 2019|Cyber-Security, Email Management Tips, Email Policy|

Email security threats play a major role in the cyber battleground. In fact, most companies report they encountered email-based attacks in the past year. In addition, CSO Online reports that 92 percent of malware finds its way into the network via email. To protect their business and their customers, organizations need to anticipate email security threats and develop corresponding strategies. Experts predict that for 2020, major threats to email cyber security will include spear phishing, cloud-targeting ransomware and insufficient password measures. Spear Phishing Phishing attacks remain the primary cause of data breaches. In these attacks, criminals pose as legitimate business

Comments Off on 3 Email Security Threats and How to Safeguard Your Business in 2020
Go to Top