Looking back at cybercrime incidents of the past 10 years, only the questions of "if" and "when" remain. "If" a business has no active cybersecurity policy and processes even just hundreds of rich customer records, "when" becomes soon enough. For the past 10 years, at least eight large-scale data breaches per year have trembled economies. You’d imagine that as business owners, we would have learned the immense value of the digital data we hold. The Ponemon Institute says that just in the US, the average size of a data breach is 25,575 records with a cost of $150 per record on average. That could be the money you would have paid in damages, as a government fine, and potentially in customer lawsuits.
Often, the significance of backing up your company’s data is diminished by the hundreds of other things you must do as a small business owner to simply keep the company running day-to-day. Unfortunately, what most small business owners fail to realize is that the lack of an adequate data backup can cause the doors of a business to close more often than you’d think. For this reason, it is crucial that every company has at least one efficient and effective method of data backup in place.
Innovyze has announced Rick Gruenhagen as Chief Technology Officer. Gruenhagen assumes a key role on the executive team reporting to CEO Colby Manwaring. He will oversee the company’s overall product direction and development and will lead the engineering, product and infrastructure teams.
vpnMentor’s research team recently discovered a breached database, containing more than 135 million records. The database, claims vpnMentor, belongs to Cloud backup provider SOS Online Backup.
Cybersecurity breaches are a major threat to every business and can quickly lead to network downtime. In fact, a standard breach costs an average of $3.5 million (IBM). However, if a large organization is unprepared, this cost could skyrocket, as was the case for one firm last year, which lost an estimated $51 million after halting operations due to a breach.
Is it truly possible to train every single employee—including those working from home and organizations’ third-party partners—to spot a cyber-threat? Or to keep good cybersecurity hygiene when handling sensitive data? Or to refrain from stealing intellectual property when they’re disgruntled and about to resign? While training is a key element to preventing breaches and protecting important corporate data, training alone is not enough.
Jeffrey Brown has been named the new chief information security officer for the State of Connecticut, where he will be responsible for development, execution and monitoring of a world-class cybersecurity program.
The term “spoofing” might have a comic implication in some contexts, but it’s no joke when it comes to information security. In fact, this is a subject matter of a whole separate chapter in a seasoned cybercriminal’s handbook. It comprises a multitude of techniques aimed at camouflaging a malicious actor or device as somebody or something else. Out of all the nefarious scenarios that fit the mold of a spoofing attack, the following 11 types are growingly impactful for the enterprise these days.
United Natural Foods, Inc. (UNFI), a large grocery distributor in the U.S., announced that Jack Clare has been named its new Chief Information Officer.