Should Retailers Purchase Cyber Insurance to Mitigate Ransomware Risk?

By |2022-02-23T15:08:29-05:00January 19th, 2022|Cyber-Security, Safety and Cyber Security|

According to a recent report, 44 percent of retail organizations suffered ransomware attacks in 2020. And attacks increased in 2021. With the average cost of a single ransomware attack reaching nearly $2 million, many retail businesses have looked to cyber insurance to offset the risk. But the choice of whether or not to purchase cyber insurance requires careful consideration. As the threat landscape changes, insurance companies have also had to change their approach. Cyber insurance can prove costly. And it does not prevent attacks, merely helps recovery. In fact, some experts warn that purchasing this type of insurance can even

Comments Off on Should Retailers Purchase Cyber Insurance to Mitigate Ransomware Risk?

Data Governance Best Practices Drive Retail Business Growth

By |2022-02-17T15:02:05-05:00January 12th, 2022|Information Governance and Management, Safety and Cyber Security|

Successful retailers know the value of information. Armed with data from all facets of the business, from marketing to shipping, retailers use information to gain a competitive advantage. But vast potential comes with inherent challenges. Harnessing data governance best practices allows retail businesses to move past roadblocks and drive success. Business Benefits of Data-driven Retailing When effectively organized and managed, data delivers significant benefits throughout the customer journey. For instance, retailers use data to personalize marketing campaigns and forecast demand for products and services. Knowing customer buying habits boosts upselling and customer retention. Additionally, data provides insights into business processes,

Comments Off on Data Governance Best Practices Drive Retail Business Growth

7 Best Practices to Protect Your Phone from Hackers

By |2022-02-17T15:17:53-05:00July 21st, 2021|Cyber-Security, Information Governance and Management, Safety and Cyber Security|

The phone in your pocket can prove both one of your biggest assets and one of your biggest liabilities. Think of the worlds a thief can enter through your mobile phone. They can access your finances, your precise location, your contacts, sensitive business and health documents, and much more. The following tips will help you protect your phone from hackers. Hackers can access your phone directly or through iCloud. Or, using minimal, easily discovered, personal information, they can monitor your communications and location or even hijack your phone. By using a combination of technology and common sense, users can keep

Comments Off on 7 Best Practices to Protect Your Phone from Hackers

When Common Authentication Methods Fail to Protect Your Identity

By |2021-08-06T05:28:34-04:00June 9th, 2021|Cyber-Security, Safety and Cyber Security|

Recently published identity theft statistics paint a sobering picture. For instance, in the United States, identity theft rates have climbed twice as high as the global average. Every two seconds sees a new victim of identity theft, and standard authentication methods may not provide enough protection. No One Immune to Identity Theft Despite vigilant security habits, a small business owner recently discovered that thieves had stolen his identity. He enrolled in LifeLock but continued to experience problems that even interrupted his ability to do business effectively. Finally, he realized that the thieves had hijacked his smartphone. As a result, authentication

Comments Off on When Common Authentication Methods Fail to Protect Your Identity

State-backed Cyber Attacks Pose Dangerous Threat to Business

By |2021-04-19T06:21:59-04:00March 31st, 2021|Cyber-Security, Safety and Cyber Security|

In late 2020, a study showed that 80 percent of businesses worried about state-backed cyber attacks. Within weeks, the Russian-sponsored SolarWinds hack and the China-backed Microsoft Exchange hack came to light, confirming those concerns. Should businesses and individuals fear these attacks, or do they only affect government agencies? Lawless Frontier Invites Multiple Players In recent years, countries have increasingly turned to the cyber arena to conduct espionage and warfare. Unlike traditional warfare, very few international laws exist to govern cyber warfare. And, while Russia and China currently dominate the stage, smaller countries can also make a big impact with a

Comments Off on State-backed Cyber Attacks Pose Dangerous Threat to Business

7 Coronavirus related scams targeting your business

By |2020-06-11T13:37:38-04:00May 11th, 2020|Cyber-Security, Safety and Cyber Security|

We’ve warned consumers about Coronavirus related scams, but businesses are at risk, too. Keep your guard up against these seven B2B scams that try to exploit companies’ concerns about COVID-19. In addition to sharing this information with your employees and social networks, read on for how you can report Coronavirus scams to the FTC. Coronavirus related scams: "Public Health" Scams Fraudsters are sending messages that claim to be from the Centers for Disease Control and Prevention (CDC), World Health Organization (WHO), or other public health offices. They may ask for Social Security numbers, tax IDs, etc. Other variations direct you to

Comments Off on 7 Coronavirus related scams targeting your business

COVID-19 Phishing SCAMS: 5 ways to Protect Your Business

By |2020-06-11T13:49:00-04:00April 23rd, 2020|Cyber-Security, Safety and Cyber Security|

Since the COVID-19 pandemic began, cybercrime has increased by up to 300%. According to cyber security experts, a big part of that increase has come in the form of COVID-19 phishing scams. Now more than ever, organizations must remain hyper-vigilant to protect assets and employees from attack. With many employees working from home (WFH), everyone appears to be a target. With expanded security perimeters, reports of phishing attacks are way up, even within our own organization. Current COVID-19 Phishing Scams The most common COVID-19 phishing scams involve the sinister but effective method of spoofing authoritative sources. Often-spoofed organizations include the

Comments Off on COVID-19 Phishing SCAMS: 5 ways to Protect Your Business

Coronavirus Phishing Attacks Target Remote Workers

By |2020-06-12T10:32:00-04:00March 24th, 2020|Cyber-Security, Safety and Cyber Security|

Spurred by social distancing orders, the American workforce is returning home. In fact, Netskope Threat Labs reports that 58 percent of users worked remotely last week. This compares with an average of 27 percent prior to the pandemic. Unfortunately, researchers have also recorded a corresponding spike in coronavirus phishing attacks. Cyber criminals love a crisis, from terror attacks to natural disasters. Using emotional appeals and a sense of urgency, they trick users into surrendering sensitive information or unknowingly downloading malware. And most of the time, they use email to launch the attack. Remote Work Raises the Risk While advances in

Comments Off on Coronavirus Phishing Attacks Target Remote Workers

10 ways to keep your data private

By |2020-06-15T10:51:34-04:00January 30th, 2020|Safety and Cyber Security|

10 ways to keep your data private used with permission from Norton by Symantec The Internet has blurred the lines between real world and the virtual one. Technology is barreling into our hands through smartphones at an unbelievable pace. This is good for productivity and progress, but it makes it easy for thieves to do their job. The anonymity and location independence that comes with the Internet muddles the moral character of even the most ethical person. There’s no assuming your phone and the information it stores is safe from the malicious intentions of the human mind. Remember, the first

Comments Off on 10 ways to keep your data private

3 Reasons Organizations Need an Email Policy and How to Build a Good One

By |2020-06-01T09:13:38-04:00December 11th, 2019|Email Management Tips, Email Policy, Safety and Cyber Security|

Despite of the proliferation of messaging apps and video conferencing, email remains the preferred method for business communication. It offers simplicity, flexibility and immediacy. At the same time, email introduces substantial risk to an organization. A well-crafted email policy helps businesses tap into the benefits of email while mitigating the risks. For example, with a single email, a team leader can instantly communicate with her entire team. She can attach project files to the email and link the information to a calendar event. Any responses become part of a permanent conversation. Months later, an employee can reference that conversation with

Comments Off on 3 Reasons Organizations Need an Email Policy and How to Build a Good One
Go to Top