“By motivating employees to quickly respond and complete security awareness training," explained the Manager of IT security and disaster recovery for a Fortune 1000 manufacturing company, "it means a company’s workforce is armed against the most current attacks. In addition, using automated phishing attacks enables companies to streamline operations, save money, and protect their organization at the same time.” ...
INFOSECURITY-MAGAZINE
READ MORE
|
CNA has announced the launch of a program of cyber risk services designed to help companies take a holistic approach to cyber threats. CNA CyberPrep is a new addition to CNA’s suite of cyber liability insurance products and risk-control services. The program is based on the National Institute of Standards and Technology (NIST) and is rooted in partnerships with cybersecurity professionals, the company said. These partnerships will provide companies access to risk-control information and se...
INSURANCE BUSINESS AMERICA
READ MORE
|
A new study of a cyberattack last month against Ukrainian power companies suggests malware didn't directly cause the outages that affected at least 80,000 customers....
COMPUTERWORLD
READ MORE
|
IT execs may “feel” as though they’re prepared for a cyber-attack—but yet, they’re not investing anything in responding to one....
INFOSECURITY MAGAZINE
READ MORE
|
UK online bankers are more security conscious than those in the US, Germany and Russia, according to new research from Eset. The security vendor polled at least 1,000 “demographically representative” internet users from each country in the third quarter to find out attitudes to online banking. It found that 77% of UK users have security software installed on the machine they use for logging into their bank account. This was more than those in the US (74%), Germany (69%) and Russia (6...
INFOSECURITY MAGAZINE
READ MORE
|
The undertaking also specifies that the SLC data controller “shall implement such other security measures as are appropriate to ensure that personal data is protected against unauthorized and unlawful processing, accidental loss, destruction, and/or damage”....
INFOSECURITY MAGAZINE
READ MORE
|