10 Tips to Minimize Impact of a Breach

|

article image
Organizations of all sizes and across all industries need to prepare for, respond to and recover from complex and large-scale security incidents. The ten tips provided in this white paper will help you to: Minimize the duration and impact of a security incident; Prioritize changes to enhance the security of your environment.

Spotlight

Room 5

Room 5 is a fast growing company that specializes in helping our clients develop smart products to connect to the Internet of Things. We work with the most exciting and innovative companies in areas like consumer electronics, silicon manufacturing, mobile devices, defense and aerospace. You might not have heard of us before, but you’ve heard of our customers, and you’ve heard of the products we’ve worked on. Real engineers, building real products, we’re fast, expert, efficient and effective. We believe the future is now - and we want to help you build it.

OTHER ARTICLES

Data Privacy Problem: Are Home Genealogy Kits a Security Threat?

Article | March 2, 2020

Surprising news recently emerged from the personal genetics business. The two leading direct-to-consumer companies in North America, 23andMe and Ancestry.com, announced within a week of each other that they were laying off a significant proportion of their workforce as a result of a steep drop in sales. This past Christmas, the sales of testing kits were expected to take a sharp hike — nothing says family like a gift that says prove it. But sales plummeted instead. According to Second Measure, a company that analyzes website sales, 23andMe’s business plummeted 54 per cent and Ancestry kits sales declined 38 per cent. Industry executives, market watchers and genealogists have all speculated about the causes of the drop in consumer interest. Market saturation? Early adopters tapped out? Limited usefulness? Recession fears? Whatever the theory, everyone seems to agree on one factor: privacy concerns.

Read More

Wormable, Unpatched Microsoft Bug Threatens Corporate LANs

Article | March 2, 2020

Microsoft is warning on a wormable, unpatched remote code-execution vulnerability in the Microsoft Server Message Block protocol – the same protocol that was targeted by the infamous WannaCry ransomware in 2017.The critical bug (CVE-2020-0796) affects Windows 10 and Windows Server 2019, and was not included in Microsoft’s Patch Tuesday release this week. The bug can be found in version 3.1.1 of Microsoft’s SMB file-sharing system. SMB allows multiple clients to access shared folders and can provide a rich playground for malware when it comes to lateral movement and client-to-client infection. This was played out in version 1 of SMB back in 2017, when the WannaCry ransomware used the NSA-developed EternalBlue SMB exploit to self-propagate rapidly around the world.

Read More

3 Trends in Data Privacy Breach Laws That Will Carry Over to 2020

Article | March 2, 2020

During 2019, new privacy laws were introduced, and many current laws evolved in the United States and across the global landscape. With the General Data Protection Regulation (GDPR) in full effect, we saw expensive fines levied upon companies that fell victim to data privacy breaches. As we move into a new year, probably the biggest takeaway from 2019 is that being proactive and having a data privacy strategy in place is important to help mitigate the risk of a data privacy breach. The regulatory landscape continues to evolve as states and countries actively pass new expanded requirements for privacy and cybersecurity regulations. While laws in the U.S., like the California Consumer Privacy Act (CCPA), are getting significant attention, many other states and countries are actively amending their breach notification laws to include tighter restrictions.

Read More

Security by Sector: Medical IoT Gets Much Needed Dose of Cybersecurity

Article | March 2, 2020

The subject of how information security impacts different industry sectors is an intriguing one. For example, how does the finance industry fare in terms of information security compared to the health sector, or the entertainment business? Are there some sectors that face greater cyber-threats and risks than others? Do some do a better job of keeping data secure, and if so, how and why? Information security risks and challenges in the healthcare industry are well documented and much maligned. There are several reasons why the healthcare sector is particularly vulnerable, but one of the chief causations is the high amount of connected yet insecure devices commonly used within hospitals, clinics and medical centers. For example, a report from researchers at healthcare cybersecurity company CyberMDX discovered that connected medical devices are twice as likely to be vulnerable to the BlueKeep exploit compared to other devices on hospital networks.

Read More

Spotlight

Room 5

Room 5 is a fast growing company that specializes in helping our clients develop smart products to connect to the Internet of Things. We work with the most exciting and innovative companies in areas like consumer electronics, silicon manufacturing, mobile devices, defense and aerospace. You might not have heard of us before, but you’ve heard of our customers, and you’ve heard of the products we’ve worked on. Real engineers, building real products, we’re fast, expert, efficient and effective. We believe the future is now - and we want to help you build it.

Events