Cyber-Risk

Ransomware Attacks Pose Growing Threat

Ransomware Attacks Pose Growing Threat

Recent ransomware attacks highlight a rapidly expanding cyberrisk vector.

 
The Board’s Cybersecurity Responsibility

The Board’s Cybersecurity Responsibility

Courts have found that board directors have a fiduciary duty to protect sensitive data.

 
As Regulations Change, Risks Stay the Same

As Regulations Change, Risks Stay the Same

Board members and top-level executives continue to be most concerned about regulatory risk.

 
Election Year Gridlock May Stall Cyber Reform

Election Year Gridlock May Stall Cyber Reform

As 2016 candidates vie for office, much-needed cybersecurity legislation will likely be put on hold.

 
Cyber Ignorance Is Not Bliss

Cyber Ignorance Is Not Bliss

More than 40% of executives are either unsure whether their companies have formal cybersecurity protocols in place or do not understand them.

 
10 Cyberthreat Predictions for 2016

10 Cyberthreat Predictions for 2016

While cyberrisks constantly evolve, information security experts try to map this year’s threat landscape.

 
How to Spot a Phish

How to Spot a Phish

These common characteristics of phishing attacks can help email users better avoid scams.

 
The Devil in the Details

The Devil in the Details

Exploiting psychology more than technology, social engineering fraud has become one of the fastest-growing corporate crime threats.

 
Data Protection Across the Pond: Implications of the EU’s New Legislation

Data Protection Across the Pond: Implications of the EU’s New Legislation

A new EU data privacy law has profound operational and financial implications for businesses around the world.

 
Social Media’s Criminal Element

Social Media’s Criminal Element

Criminals are using social media to more easily identify and target victims.

 
The 2015 Data Breach Toll

The 2015 Data Breach Toll

According to the Identity Theft Resource Center, 2015 saw 780 data breaches that exposed a total of 177,866,236 records.

 
6 Tips to Reduce the Risk of Social Engineering Fraud

6 Tips to Reduce the Risk of Social Engineering Fraud

While it is impossible to eliminate the threat of social engineering fraud, there are several easy—and often inexpensive—ways businesses can reduce the risks.

 
Year In Risk 2015

Year In Risk 2015

Some of the year’s biggest events have lasting implications for the future of risk management.

 
How the NSA’s First CRO is Integrating Risk Management Into National Security

How the NSA’s First CRO is Integrating Risk Management Into National Security

Anne Neuberger, the NSA’s first CRO, discusses building an ERM program and the role risk management plays in national security.

 
Smart Cities: Weighing the Risks and Rewards of Connecting Communities

Smart Cities: Weighing the Risks and Rewards of Connecting Communities

The spread of the Internet of Things has given rise to “smart cities,” where technology promises to enhance municipal services.