DATA SECURITY

5WPR Announces Dedicated Cybersecurity PR Practice

5WPR | June 30, 2021

5WPR Announces Dedicated Cybersecurity PR Practice
One of the largest independently-owned PR firms in the U.S., 5W Public Relations, proudly announces its creation of a specialty cybersecurity practice. The new specialty division will concentrate on PR services connected to anti-fraud, cybersecurity, privacy, and compliance companies for B2C and B2B categories.

As a prominent agency and innovator in the PR space, the cybersecurity specialty team holds broad experience operating in privacy, IT infrastructure, SaaS, blockchain, telecom, no-code development and logistics, and artificial intelligence. It also possesses a deeper understanding of these multifaceted technologies. In addition, the cybersecurity specialty team of 5W is also profoundly rooted in cybersecurity culture and hacking, ready to position their customers for the subsequent trending subject.  

5WPR was named agency of record for more than a few leaders in the cybersecurity space, including fraud protection solutions, mobile identity systems, parental control monitoring apps, and enterprise technology solution providers used to back our national security.

PR services offer the clients services including media relations, messaging and positioning, new market expansion campaigns, initial public offering media strategy, content creation, visibility programs, digital media campaigns, sponsorships/partnerships, event planning, speaking opportunities, and thought leadership.

About 5WPR

5W Public Relations, a full-service PR agency in NYC, is well-known for innovative programs that engage with various businesses, ideas, and issues.  More than 200 professionals serve clients in B2C and B2B business models for Public Affairs, Crisis Communications, and Digital Marketing. 5W helps businesses with a resourceful, results-driven, and bold approach to communication. 5W was awarded 2020 PR Agency of The Year, and CEO Ronn Torossian was named 2020 Entrepreneur of the Year by the American Business Awards.

Spotlight

Well-organized cybercriminals operate in powerful networks that allow them to attack thousands of online businesses using an efficient and scalable model. Hackers steal millions of credit cards and identity data to be sold to fraud rings. Using proxies and VPN, the fraud rings launch global fraud attacks from anywhere in the world. By contrast, banks and online businesses often operate in silos, independent of intelligence gathered from attacks on other business, and challenged by the need to balance fraud detection with reduced friction for legitimate customers.

Spotlight

Well-organized cybercriminals operate in powerful networks that allow them to attack thousands of online businesses using an efficient and scalable model. Hackers steal millions of credit cards and identity data to be sold to fraud rings. Using proxies and VPN, the fraud rings launch global fraud attacks from anywhere in the world. By contrast, banks and online businesses often operate in silos, independent of intelligence gathered from attacks on other business, and challenged by the need to balance fraud detection with reduced friction for legitimate customers.

Related News

DATA SECURITY

CynergisTek Announcesa three-year Alliance with Leading Medical System to Combat Healthcare Cyber Threats

CynergisTek | January 07, 2022

CynergisTek Announcesa three-year Alliance with Leading Medical System to Combat Healthcare Cyber Threats CynergisTek a leading cybersecurity, privacy, compliance, and IT audit firm, announced that it has signed a 6-figure, multi-year Resilience Partner Program (RPP) agreement. This program aims to provide annual cybersecurity risk assessments, testing, and advisory services. The program will benefit a leading, nationally recognized, community-owned medical system. The program will allow the healthcare system to reduce cybersecurity risks and function smoothly. “We look forward to serving this client with our Resilience Partner Program and we understand the need to provide healthcare organizations support to not only discover gaps, but also figure out how to prioritize remediation and stick around for advisory support. The threat environment has increased through the pandemic, with more cyber-attacks and criminal behavior being directed towards the healthcare industry just as the environment has become more vulnerable. The cost of these cyber events is rising sharply with cyber insurance premiums and compliance requirements increasing. To meet these challenges, CynergisTek continues to partner with our clients, roll out services, and evolve our existing services, resulting in 2021 being our strongest annual bookings year in the last three.” Mac McMillan, CEO and President at CynergisTek The Resilience Partner Program of CynergisTek is aimed at supporting various needs of healthcare clients related to cyber threats. The programs offer multiple services, such as: Annual risk assessments Medical device security Vendor security management Technical testing Control validation Advisory support Remediation guidance

Read More

Leveraging Greater Social Engagement for Improved Cyber Hygiene

Cisco | May 19, 2020

Social Cybersecurity is a new and emerging concept and paradigm that basically involves how better cybersecurity behaviors can be inclined positively using social influence. Practicing proper cyber hygiene in order to protect themselves and others, from the ill effects of cybercrime or cybersecurity issues. There exist any number of tasks and approaches that can be undertaken to protect our computer systems from cybersecurity risks. You don’t have to look too far around to find someone who may not be practicing proper cyber hygiene in order to protect themselves and others, from the ill effects of cybercrime or cybersecurity issues. For example, despite the fact that we may be aware that using the same user ID or email account and password, for different cloud services, is considered risky behavior, and could result in a potential account hack or data breach, yet we do not change this behavior. How often do you share your best practices for securing your devices, cloud service applications, mobile applications and home networking equipment for connecting to the Internet with those around you in a social situation or manner? Do you recommend the use of available security settings to those around you in your social circles? Do you show them how to quickly implement the security settings? In this article we discuss some ways for improving cyber hygiene. Social Cybersecurity is a new and emerging concept and paradigm that basically involves how better cybersecurity behaviors can be inclined positively using social influence. It’s worth to keep an eye out for the research going on regarding social cybersecurity, because it may have some answers to getting people and companies to better protect themselves. Learn more: CORONAVIRUS-THEMED CYBERATTACKS ON BUSINESSES RISE, EXPERTS RECOMMEND BEEFING UP NETWORK SECURITY “Even if this approach has a small positive effect on improving cyber hygiene, it is worth it, because something must change if we are going to help individuals better protects themselves.” ~ Stan Mierzwa, Director Even if this approach has a small positive effect on improving cyber hygiene, it is worth it, because something must change if we are going to help individuals better protects themselves. There exist any number of tasks and approaches that can be undertaken to protect our computer systems from cybersecurity risks. This ranges from ensuring you install and keep your anti-virus or endpoint protection system up to date, apply software security updates, encrypt sensitive data, backup our important data, and this list can continue to grow. “Social Cybersecurity brings a dimension with consideration for the individual, not the computer, and how with social psychology, usable and powerful social forces, such as social norms, can have outsized influences on people’s behaviors and perceptions of risk.” Social Cybersecurity brings a dimension with consideration for the individual, not the computer, and how with social psychology, usable and powerful social forces, such as social norms, can have outsized influences on people’s behaviors and perceptions of risk. The Human-Computer Interaction Institute at Carnegie Mellon University and other researchers are bringing focus to this new scientific area of cybersecurity. As their website (www.socialcybersecurity.org) mentions, this group is leveraging insights from social psychology and other fields to develop novel interventions and strategies for nudging adoption of expert-recommended tools and practices. Can we leverage social interactions or the influence of social situations to enhance our cyber hygiene or help thwart cyber threats? The research results from interviews done provided a theme that the observability of security feature usage was a key enabler of socially triggered behavior change and conversation – in encouraging the spread of positive behaviors, discouraging negative behaviors, and getting participants in the study to talk about security. The work presented is innovative and brings encouragement and opportunities in how systems can be designed to encourage better cybersecurity behaviors. One can also think of Social Cybersecurity in contrast and comparison to the criminological theory called “Social Learning Theory”. In Social Learning theory, delinquents are likely to engage in deviant or criminal behavior when those actions have been positively reinforced. Learn more: PHISHING ATTACKS DISGUISED AS FAKE CERT ERRORS ON CISCO WEBEX USED TO STEAL USER CREDENTIALS

Read More

PLATFORM SECURITY

Credence Security Signs Partnership Agreement with Infosec Ventures to Deliver Human-Centric Security Solutions to the Middle East

Credence Security | August 25, 2021

Credence Security, a leading regional specialized value-added distributor for cybersecurity, forensics, governance, risk and compliance solutions, today announced that it has signed a partnership agreement with Infosec Ventures' HumanFirewall, a leader in human cyber risk mitigation and management. Under the agreement, Credence Security will be responsible for promoting and delivering Infosec Ventures' HumanFirewall® platform across its robust channel network in the Middle East. Infosec Ventures' offerings are available entirely on-premises or in a local cloud, in line with compliance and data sovereignty regulations, specifically for mission critical organizations in the government as well as large enterprises. Hackers are increasingly preying on the human element of cybersecurity, as a primary attack vector. According to the Verizon 2021 Data Breach & Incident Report (DBIR), over 85% of data breaches involved human error. In the Middle East, a 2020 study by the Ponemon Institute and IBM Security, revealed that the average cost of a data breach per company in the region is $6.53 million, which is higher than the global average of $3.86 million per incident. The report also identified human error among the most common root causes of data breaches in the UAE and Saudi Arabia. Additionally, similar industry studies have indicated that more than 90% of successful cyber-attacks begin with an email. These figures highlight a significant need for solutions that will not only safeguard business-critical systems but will also transform employees into an organization's best cybersecurity asset. HumanFirewall® transforms employees from an organization's weakest link into their strongest line of defence. It is a world-first security awareness and training platform that also works when real attacks strike. It augments with technology what humans lack in attention. It gamifies the learning experience via phishing simulations, builds individual risk-profiles, rewards real-time reporting, remediates incidents instantly, orchestrates auto-blacklisting enterprise wide via easy to deploy one-click integration with Microsoft 365 (O365), Google Workspace (formerly GSuite) and Exchange. The solution is trusted by top corporations in 142 countries. "We selected Credence Security as our regional value-added distributor based on our shared ethos of being a channel-centric business. Besides their proven market expertise and extensive channel network, Credence Security has a strong understanding of our needs and vision as a leading vendor in the region. Also, like us, they are passionate about cybersecurity. We are confident that by partnering with a premier distributor such as Credence Security, we can further accelerate our already strong local presence and fast-track our growth." Garreth Scott, Managing Director, Credence Security, said, "People's desire to quickly process information with minimal effort has created a unique vulnerability in the digital age, making them the weak links in the cyber chain. We firmly believe that HumanFirewall's innovative cybersecurity tools, backed by its exceptional team of industry experts, address a compelling demand for a modern approach to securing the human element. We are looking forward to bringing their ground-breaking solutions to our partners and customers across the Middle East region." ABOUT CREDENCE SECURITY: Established in 1999, Credence Security, a PAN-EMEA speciality Value-added Distributor, is a leader in Cybersecurity, Forensics, Governance, Risk and Compliance. With headquarters in Dubai and regional offices in Johannesburg, London, Nairobi, and Hyderabad. We are a pure-play provider of security and forensics solutions, to both public and private sector enterprises across Europe, Middle East, Africa and India, through a select network of specialist resellers. ABOUT HUMANFIREWALL HumanFirewall transforms employees from an organisation's weakest link into their strongest line of defence. It is a world-first security awareness and training platform that also works when real attacks strike. It augments with technology what humans lack in attention. It gamifies the learning experience via phishing simulations, builds individual risk profiles, rewards real-time reporting, remediates incidents instantly, orchestrates auto-blacklisting enterprise-wide via easy to deploy one-click integration with O365, GSuite and Exchange. Trusted by top corporations in 142 countries.

Read More