Breach Guide

Learn the steps to take in the event of a data breach and stay current on the cyber threat landscape with the FTC’s Data Breach Resources, FBI’s Daily Digest Library and San Diego’s Cyber Incident Response Guide.

Federal Trade Commission (FTC) Data Breach Resources

Find out the steps to take as a business or consumer if you experience a data breach.

ftc-gov

FBI Cyber Daily Digest Library

Stay current on the global threat landscape with the FBI’s daily circulation of published data breaches and articles.

  • 6 Steps to Effectively Manage Business Data

    • Not every company has a data manager who knows how to turn big data into a competitive advantage.
    • If you manage data improperly, that may slow down the business growth and cause more problems than benefits.
    • But if you collect, process, and store data wisely, that will make your company thrive.
    | June 23, 2020
  • Twitter apologises for business data breach

    • Twitter has emailed its business clients to tell them that personal information may have been compromised.
    • Unbeknownst to users, billing information of some clients was stored in the browser's cache, it said.
    | June 23, 2020
  • Australia targeted by sophisticated cyber attacks

    • Prime Minister Scott Morrison announced on Friday 19 June that, based on the advice provided by the Federal Government’s cyber experts, a “sophisticated state-based cyber actor” was targeting Australian organisations.
    • “We know it’s a sophisticated state-based cyber actor because of the scale and nature of the targeting and the tradecraft used."
    • China denies responsibility for the attacks
    - Kim Ho | June 23, 2020
  • 5 Mistakes Your Remote Team Should Avoid

    • There are possible mistakes your remote team could make that can hurt you.
    • That is why you need to be conversant with some of them to save you from cybersecurity risks that can cost your business millions.
    | June 22, 2020
  • 50 Stats Showing Why Companies Need To Prioritize Consumer Privacy

    • As cybersecurity threats increase, more consumers are concerned about who has their data and how it is used.
    • New regulations have been put in place around the world to return power to customers to take control of their data.
    • Although consumer confidence in how companies handle data isn’t high, organizations have a huge opportunity to proactively buoy their privacy plans to better protect customer data and improve the overall experience.
    - Blake Morgan | June 22, 2020
  • China cyber attacks: Beijing’s misinformation war against Australia

    • For years, China has been waging a secret war on its enemies and allies alike – now it’s moving out into the open, and Australia has had enough.
    • Last week, the European Union (EU) issued a report concluding Russia and China had led targeted disinformation campaigns designed to destabilise democratic processes and to paint their authoritarian leaders in a positive light.
    • Shortly later, Twitter confirmed the finding by announcing it had deactivated 32,000 fake anonymous accounts that had been operated by state-controlled propaganda units.
    - Jamie Seidel | June 22, 2020
  • Why businesses struggle to unlock value from their data

    • Data has become a critical component for businesses in every sector, yet many struggle when it comes to extracting full value from it.
    • Unlocking this value from data is proving something of a challenge. This is because a large proportion of data held within organisations is stored (or even trapped) in infrastructure silos located both on-premises and in cloud-based platforms.
    • This situation not only means the data difficult to manage, but it also makes deriving value from the data very complex.
    - Steve Coud | June 22, 2020
  • Common misconceptions about smart homes and biometrics

    • Smart home integration is gaining popularity – especially in modern times with more people confined to their homes by Covid-19.
    • The most common misconception is the immunity of biometrics to potential attack. It is critical to disengage the connection between data breach stories and biometrics, by focusing on the fact that the real cause of most attacks is not biometrics itself, but the storage of biometrics data in a centralised database.
    - Andrew Shikiar | June 22, 2020
  • Turn on MFA Before Crooks Do It For You

    • Hundreds of popular websites now offer some form of multi-factor authentication (MFA), which can help users safeguard access to accounts when their password is breached or stolen.
    • But people who don’t take advantage of these added safeguards may find it far more difficult to regain access when their account gets hacked, because increasingly thieves will enable multi-factor options and tie the account to a device they control.
    - Brian Krebs | June 19, 2020
  • CIA's 'woefully lax' security allowed the 'Vault 7' data breach

    • A new report into how WikiLeaks revealed the CIA's tools for hacking Macs slams the security agency's "unacceptable" lack of security over its own systems.
    • The report confirms that between 180GB and 34 terabytes of information were leaked, but the investigators still can't be more precise because of inadequate security on the systems involved.
    • It notes that it's only because WikiLeaks published the data that the CIA knew it had been stolen.
    ai - William Gallagher | June 17, 2020

San Diego Cyber Incident Response Guide

Learn more about San Diego’s region-wide cyber incident response guide and available local, state and federal resources.

San Diego Cyber Incident Response Guide October 2017