Cybersecurity Archive

What You Need to Know About Cyber Extortion Insurance Coverage

What You Need to Know About Cyber Extortion Insurance Coverage

Although the specific policy wording varies, many cyber policies provide coverage for extortion-related expenses and payments paid as a result of a cyber extortion threat.

 
Improving Health Care Cybersecurity

Improving Health Care Cybersecurity

Regulators and health care providers alike must do more to secure patient data.

 
How to Comply with New York’s Cybersecurity Regulation Without Breaking the Bank

How to Comply with New York’s Cybersecurity Regulation Without Breaking the Bank

With New York’s new cybersecurity regulation, smaller financial services enterprises must quickly organize, assess and secure their infrastructure.

 
Cybercrime Costs Businesses $11.7 Million Per Year

Cybercrime Costs Businesses $11.7 Million Per Year

The annual costs of cybercrime, number of breaches, and mitigation time to resolve them are all on the rise.

 
Enhancing Security with Big Data Analytics

Enhancing Security with Big Data Analytics

Security information systems need improvement in order to keep up with today’s rapidly evolving cyberthreat landscape.

 
Lessons from the Yahoo Hack

Lessons from the Yahoo Hack

The attack on one billion Yahoo accounts reveals vulnerabilities also common to other systems.

 
Complying with New York’s New Cybersecurity Regulations

Complying with New York’s New Cybersecurity Regulations

By protecting and securing their privileged accounts, organizations can achieve compliance with key sections of 23 NYCRR 500.

 
Creating a Human Impact Cyberattack Response Plan

Creating a Human Impact Cyberattack Response Plan

While most organizations have an information security plan in place to defend their data and infrastructure, they often are not as prepared to deal with the human consequences of an attack.

 
How to Use the World Economic Forum’s Cybersecurity Principles

How to Use the World Economic Forum’s Cybersecurity Principles

Ten best practices for boards of directors and the C-suite to take a holistic, risk-based approach to cyberrisk.

 
How to Create a Cyber-Savvy Corporate Culture

How to Create a Cyber-Savvy Corporate Culture

When it comes to cybersecurity, the conversation normally focuses on technology, policies and processes. But too often these discussions overlook a critical component: people.

 
Five Third-Party Cybersecurity Myths

Five Third-Party Cybersecurity Myths

Third-party relationships create some of the hardest-to-manage cyberrisks in any industry.

 
Data Deluge: What the Panama Papers Mean for Business

Data Deluge: What the Panama Papers Mean for Business

The widespread corruption and third-party data security vulnerabilities revealed in the Panama Papers scandal demand attention now.

 
Constant Hacking

Constant Hacking

Nine out of 10 businesses experienced at least one hacking incident in the past year, yet risk managers may be doing less on some critical measures.

 
Improving M&A IT Security Practices

Improving M&A IT Security Practices

Insecure third parties often put valuable data at risk during a merger or acquisition.

 
Managing Privileged Access Hacking Threats

Managing Privileged Access Hacking Threats

As cybercriminals get smarter, companies need to get serious about monitoring network access.