- Banking and credit data is worth $5.40 per record on the Dark Web, while healthcare records are worth over $250 each. This is because healthcare records typically contain virtually all the private and protected information that exists for that person, including banking and credit card data.
- It is likely prudent to assume we have entered the realm of the perimeter-free workplace, and that remote work combined with less populated and less-dense office locations will be part of that future new normal.
- Now is the time to evaluate and assess what that might look like for each of our organizations and do what we can to protect healthcare data.
- David MacLeod | June 30, 2020
hak-iq.us20.list-manage.comJune 30, 2020
- A data breach broker is selling databases containing user records for 14 different companies he claimed were breached by hackers in 2020.
- When a company is breached, threat actors will typically download accessible databases, including account records. These databases are then sold directly to other threat actors, or the hackers utilize data breach brokers to sell them on their behalf.
- Each of the fourteen databases being sold contains different information, but they all include usernames and hashed passwords.
- Lawrence Abrams | June 29, 2020
hak-iq.us20.list-manage.comJune 29, 2020
- A preliminary settlement of a class action data breach lawsuit against Iowa Health System - which does business as UnityPoint Health - contains an extraordinary provision that could prove quite costly.
- Unlike settlements in most other data breach class action lawsuits, this one does not contain a "global cap" on the total amount of claims to be paid to victims.
- Marianne Kolbasuk McGee | June 29, 2020
hak-iq.us20.list-manage.comJune 29, 2020
- There is no doubt 2020 has been a challenging year for businesses across every element of the supply chain and in all sectors.
- Despite the increasing threat, it is evident that cyber attackers have been able to adapt their tactics quicker than businesses have been able to keep up.
- IT departments are still reactive, meaning they will seek to defend, defeat and deal with the consequences of an attack, but are lagging on strategies for active prevention.
- Darren Hopkins | June 29, 2020
hak-iq.us20.list-manage.comJune 29, 2020
- Ransomware is rapidly shaping up to be the defining online security issue of our era. It's a brutally simple idea, executed with increasing sophistication by criminal groups.
- The targets of the ransomware gangs have evolved, too. It's not just about PCs anymore; these gangs want to go after the really irreplaceable business assets too, which means file servers, database services, virtual machines and cloud environments.
- They'll also search out and encrypt any backups that organisations foolishly leave connected to the network.
- Steve Ranger | June 28, 2020
hak-iq.us20.list-manage.comJune 28, 2020
- Apple just unveiled a raft of changes coming with the new macOS Big Sur later this year. Along with the visual redesign, the introduction of Control Center, and upgrades to Messages, the built-in Safari browser is getting new-and-improved privacy features to keep your data locked away.
- You don't have to wait for macOS Big Sur to drop to get a lot of these upcoming features though—both Mozilla Firefox and Google Chrome have similar features, or they can with the help of a third-party extension.
- David Nield | June 28, 2020
hak-iq.us20.list-manage.comJune 28, 2020
- Security experts have identified a self-propagating malware, dubbed Lucifer, that targets Windows systems with cryptojacking and distributed denial-of-service (DDoS) attacks.
- The never-before-seen malware initially tries to infect PCs by bombarding them with exploits in hopes of taking advantage of an “exhaustive” list of unpatched vulnerabilities.
- While patches for all the critical and high-severity bugs exist, the various companies impacted by the malware had not applied the fixes.
- Lindsey O'Donnell | June 24, 2020
hak-iq.us20.list-manage.comJune 24, 2020
- Ensuring compliance has never been more critical with the combination of increased cybercrime, remote working and the growing importance of data security.
- The first step in adhering to compliance standards is to start with the employee.
- We are in difficult and unnavigated times, and a data breach won’t make things any easier.
- Employees and consumers alike are looking to businesses to prioritise security and compliance while ensuring that the tools are in place to securely work remote.
- Nicole Von Seggern | June 24, 2020
hak-iq.us20.list-manage.comJune 24, 2020
- The recent announcement that the UK-based value airline EasyJet was hacked by a "highly sophisticated source" is a troubling example of continuous IT threats.
- The attack resulted in the loss of personal information of over 9 million customers.
- Businesses have become far too accustomed to massive security breaches, disregarding them like the common cold.
- Often, the remedy appears to be free credit monitoring for the affected. But the real threat is lost in that perception of safety and a healthy bounce-back.
- Emil Sayegh | June 24, 2020
hak-iq.us20.list-manage.comJune 24, 2020
- Not every company has a data manager who knows how to turn big data into a competitive advantage.
- If you manage data improperly, that may slow down the business growth and cause more problems than benefits.
- But if you collect, process, and store data wisely, that will make your company thrive.
| June 23, 2020
hak-iq.us20.list-manage.comJune 23, 2020