Business Email Compromise (BEC) is one of the most financially damaging online crimes. In 2022, Business Email Compromise (BEC) was the second largest category of losses across all reported cybercrimes, with a collective $2.7 Billion in attributed financial loss. Since its inception, the IC3’s Recovery Asset Team has assisted private financial institutions with freezing more...Read More
Cloud Security Abstract – This article discusses the importance of understanding Cloud Security Due Diligence and level of effort required for mitigating risks that third-party cloud services (software-as-a-service, infrastructure-as-a-service, and platform-as-a-service) represent to an organization. Depending on the service, it may not be possible to conduct a thorough, direct assessment of the services, which is...Read More
Spyware is a type of malware that infects your PC or mobile device and gathers information about you, including the sites you go to, usernames and passwords, payment information, and the emails you send and receive. Similarly, stalkerware is a type of software or application that spies on victims. Stalkerware apps are capable of a plethora...Read More
VPNs (Virtual Private Networks) in theory provide anonymity and secure passage to your online destination. What we’ve increasingly seen is VPN companies go through their own security breaches and exposing users internet logs. Even when a VPN provider claims that it keeps no logs, it can simply be marketing in a way where that might...Read More
Data breaches are events where certain confidential information is accessed without proper authorization. this goes further by having copies of that data distributed. The average data breach in 2020 caused roughly 3.92 million (USD) in damages. The core concept of a data breach is the fact that data confidentiality has been compromised. Data breaches can...Read More
FIVE STEPS TO COMPLIANCEby: Michael Hall, Chief Information Security Officer Despite different industries being required to follow differently named guidelines, there’s a pretty good overlap for those information security items that IT really needs to worry about.Although there will be some personal information that may not fall under any compliance standards, from an IT perspective,...Read More
Written by Chris Peterson, Forbes According to a 2019 survey from The Conference Board of more than 800 international CEOs and 600 C-suite members, cybersecurity is cited as the top external concern. The Conference Board also notes (via CIO Dive) that malicious cyber activity cost the economy up to $109 billion in 2016. CEOs and boards that seek...Read More
The walls of the corporate workplace will become fluid for enterprises over this decade.This will be a movement driven by the way you want to work and the birth of the fully internet-driven workplace; put another way, it’s the death of the legacy corporate network which naturally means the death of traditional network security. It’s...Read More
Action sports giant Boardriders was hit by a ransomware attack that affected some of its subsidiaries, including Quiksilver and Billabong, and forced the company to shut down computing systems all over the world. Boardriders has around 10,000 employees from all over the world and its Quiksilver, Billabong, ROXY, RVCA, DC Shoes, and Element brands are sold in over 110...Read More
The so-called Hamburglar is still at large, hacking customers’ McDonald’s app accounts and ordering food on their dime. For some victims, their troubles didn’t end there as they were unhappy with how McDonald’s handled their cases. “What a mess,” said Deborah Kelly of Peterborough, Ont. She’s unimpressed after the fast-food giant mistakenly blamed mystery charges on...Read More