Cyber-Risk

Protecting Directors and Officers in the New World of Cyberthreats

Protecting Directors and Officers in the New World of Cyberthreats

Evolving regulations and investor expectations have put the onus on directors and officers to take responsibility for prevention, mitigation and recovery from cyberattacks.

 
Data Privacy Checkup

Data Privacy Checkup

As health care organizations capitalize on big data, they must minimize the risks that come with sharing patient information.

 
Downloading Danger: The Growing Threat of Mobile Malware

Downloading Danger: The Growing Threat of Mobile Malware

Hackers are increasingly using applications that contain mobile malware to target vulnerable employee smartphones.

 
Improving M&A IT Security Practices

Improving M&A IT Security Practices

Insecure third parties often put valuable data at risk during a merger or acquisition.

 
What to Do After a Ransomware Attack

What to Do After a Ransomware Attack

As ransomware attacks have become more common, organizations need a plan to respond.

 
Ransomware Attacks Pose Growing Threat

Ransomware Attacks Pose Growing Threat

Recent ransomware attacks highlight a rapidly expanding cyberrisk vector.

 
The Board’s Cybersecurity Responsibility

The Board’s Cybersecurity Responsibility

Courts have found that board directors have a fiduciary duty to protect sensitive data.

 
As Regulations Change, Risks Stay the Same

As Regulations Change, Risks Stay the Same

Board members and top-level executives continue to be most concerned about regulatory risk.

 
Election Year Gridlock May Stall Cyber Reform

Election Year Gridlock May Stall Cyber Reform

As 2016 candidates vie for office, much-needed cybersecurity legislation will likely be put on hold.

 
Cyber Ignorance Is Not Bliss

Cyber Ignorance Is Not Bliss

More than 40% of executives are either unsure whether their companies have formal cybersecurity protocols in place or do not understand them.

 
10 Cyberthreat Predictions for 2016

10 Cyberthreat Predictions for 2016

While cyberrisks constantly evolve, information security experts try to map this year’s threat landscape.

 
How to Spot a Phish

How to Spot a Phish

These common characteristics of phishing attacks can help email users better avoid scams.

 
The Devil in the Details

The Devil in the Details

Exploiting psychology more than technology, social engineering fraud has become one of the fastest-growing corporate crime threats.

 
Data Protection Across the Pond: Implications of the EU’s New Legislation

Data Protection Across the Pond: Implications of the EU’s New Legislation

A new EU data privacy law has profound operational and financial implications for businesses around the world.

 
Social Media’s Criminal Element

Social Media’s Criminal Element

Criminals are using social media to more easily identify and target victims.