Global Cyber News Digest

Daily News Digest

Stay current on the global cyber threat landscape and industry developments with CCOE’s daily digest and library of cybersecurity news and articles.

  • Most Businesses Vulnerable to Emerging Risks Not Covered by Their Cyber Insurance

    • Businesses had strong policies in place to protect against the threats most concerning to them.
    • Emerging risks also caused more losses in business income and higher rises in recovery costs.
    • However, most businesses were protected from highly publicized threats, while they paid little attention to the emerging risks.
    CPO Magazine - Alicia Hope | May 11, 2020
    hak-iq.us20.list-manage.comMay 11, 2020
  • U.S. Marshals Service Breach Exposed Personal Data of 387,000 Prisoners

    • Under the Federal Information Security Modernization Act, the data breach qualifies as a “major incident.”
    • The breached system is called DSNet, which is designed to house and transport prisoners within the agency, the federal courts and the Bureau of Prisons.
    • Information extracted included names, addresses, birth dates and Social Security numbers.
    Nextgov - Mariam Baksh | May 11, 2020
    hak-iq.us20.list-manage.comMay 11, 2020
  • Staying on top of your data breach response plan during Covid-19

    • While businesses will rightly be thinking about how best to protect their future, it’s also important for them to stay vigilant to the prospect of opportunist hackers trying to compromise the personal data they hold.
    • Shopping carts have always been an attractive target for hackers, so with many people using online services whilst the high street remains at a standstill, it’s creating greater opportunity for this kind of malicious attack - particularly across the retail and hospitality sectors.
    ITProPortal - Jim Steven | May 11, 2020
    hak-iq.us20.list-manage.comMay 11, 2020
  • Use Zoom app safely to prevent data leak, say experts

    • Users are advised not to use their personal meeting ID for conferencing. Instead, they should use new meeting IDs for each conference which can be generated randomly for a new meeting.
    • Similarly, the meeting should be locked once it commences so that no other person can log in even if the meeting credentials are shared by any participant.
    • Enabling the waiting room facility can help hosts and co-hosts to ensure their participation. Do not receive any files from participants during the call using the file-sharing facility.
    The New Indian Express - Toby Antony | May 11, 2020
    hak-iq.us20.list-manage.comMay 11, 2020
  • How To Build A Business Case For Endpoint Security

    • Endpoint security business cases do much more than just quantify costs and benefits; they uncover gaps in endpoint and cyber protection that need urgent attention to avert a breach.
    • Think of building a business case for endpoint security as the checkup every company needs to examine and identify how every threat surface can be improved.
    • Just as all efforts to preserve every person's health is priceless today, organizations can't let their guard down when it comes to keeping endpoint security strong.
    Forbes - Louis Columbus | May 10, 2020
    hak-iq.us20.list-manage.comMay 10, 2020
  • Hackers sell over 73 million stolen user records on the dark web

    • The hacking group ShinyHunters is selling about 73.2 million user records the attackers say were stolen from numerous sites. About 30 million come from the dating app Zoosk, while 15 million are from the printing service Chatbooks.
    • Like with many breaches, this appears to have been a cash grab — what’s surprising is the scale and speed of the effort.
    engadget - Jon Fingas | May 10, 2020
    hak-iq.us20.list-manage.comMay 10, 2020
  • It’s only a matter of time before your business will suffer a cyber-attack

    • Paper documentation and physical transactions are becoming increasingly less prevalent in an industry reliant upon reliable systems of record-keeping. 
    • The idea of ditching the filing cabinet for a cloud-based solution to store invaluable information is a smart move, but as the industry continues to put more faith in its freight-tech solutions, high-tech pirates may find opportunities for extortion while your data and your head are in the clouds.
    - Jack Glenn | May 7, 2020
    hak-iq.us20.list-manage.comMay 7, 2020
  • How COVID-19 is evolving the data breach communication process

    • With the vast majority of employees now working remotely it has made putting response plans together more challenging
    • Planning for a data breach in advance is a step every organisation can take and is the right thing to do by the customer. It means you can respond, reassure and recover with confidence.
    Finextra - Jim Steven | May 7, 2020
    hak-iq.us20.list-manage.comMay 7, 2020
  • World Password Day: Time to Prioritize Passwords

    • Despite proclamations that passwords are going the way of the Dodo, they are still a fundamental part of our digital lives.
    • However, they remain a weak link in our approach to cybersecurity and it’s time for us all to rethink how we create and use passwords to protect our identities from cybercriminals.
    Security Boulevard - Kim Jacobson | May 7, 2020
    hak-iq.us20.list-manage.comMay 7, 2020
  • Battling Payments Fraud: Know Your Enemy

    • A Ponemon Institute report on the cost of data breaches showed that the average cost of a data breach in 2018 was $3.86 million, up 6.4% over 2017. The average per-record cost was $148, up 4.8% from $141 in 2017. By 2020, it is estimated that ransomware attacks will quadruple, with cybercrime damage costs rising to $6 trillion in 2021.
    • By staying vigilant and notifying the right people when a suspicious email is received or when someone reaches out about something out of the ordinary, employees can avoid potential financial or reputational damage to their organization.
    Security Boulevard - Gene Scriven | May 6, 2020
    hak-iq.us20.list-manage.comMay 6, 2020