Cybersecurity Archive

Why Businesses Struggle with Email Security

Why Businesses Struggle with Email Security

Businesses and their employees are more susceptible than they realize to an array of phishing attacks and impersonations because of their blind trust in business communications—particularly email.

 
UK Cybersecurity Office Warns Against Weak Passwords

UK Cybersecurity Office Warns Against Weak Passwords

The National Cyber Security Centre offered password security insights after interviews with more than 2,500 members of the public.

 
The Case for Uniform Data Breach Reporting

The Case for Uniform Data Breach Reporting

By creating clear terms, definitions and regulations on data breach reporting, the United States can gain greater insights on growing and changing cyber threats that companies face across industries.

 
Why GDPR Should Not Stifle Information Sharing

Why GDPR Should Not Stifle Information Sharing

Does the processing and exchange of personal information embedded in some threat information violate GDPR and thus expose companies to severe fines?

 
Facebook Plagued by Recent Security Problems

Facebook Plagued by Recent Security Problems

Cybercriminals are increasingly finding new ways to exploit security vulnerabilities at Facebook, putting the personal data of the social network’s users at risk.

 
Does Attorney-Client Privilege Extend to Penetration Testing?

Does Attorney-Client Privilege Extend to Penetration Testing?

Unaddressed cybersecurity vulnerabilities uncovered by pen testers could become the basis of legal action.

 
Sharing Cybersecurity Responsibility

Sharing Cybersecurity Responsibility

Cybersecurity efforts have traditionally been the responsibility of organizations that hold data, but with so much at stake from a breach, consumers now have a role to play as well.

 
Developing a Formal Cyber Incident Response Plan

Developing a Formal Cyber Incident Response Plan

The prevalence of data breaches and stricter standards and regulations have made cybersecurity incident response plans a necessity for organizations.

 
Mobile Devices: The Next Frontier for Hackers

Mobile Devices: The Next Frontier for Hackers

As more employees use mobile apps for work, IT departments face new security challenges.

 
Getting a Handle on Handheld Risks

Getting a Handle on Handheld Risks

The explosion of mobile and social media risks has had significant implications for insurance coverage.

 
The Cybersecurity Talent Gap

The Cybersecurity Talent Gap

Organizations are facing a shortage of qualified professionals who can address the growing range of cyberrisks.

 
Banks Face New Cybersecurity Rules

Banks Face New Cybersecurity Rules

Updates to the SWIFT transaction network have created compliance challenges for banks.

 
Developing a Cyberattack Response Plan

Developing a Cyberattack Response Plan

The increasing volume of cyberattacks means that developing a complete response plan for these threats is essential to protecting your business and customers.

 
Mitigating Cyberrisk in 2018

Mitigating Cyberrisk in 2018

In order to fill the gaps and provide financial relief from a data breach, companies are increasingly turning to insurance.

 
What You Need to Know About Cyber Extortion Insurance Coverage

What You Need to Know About Cyber Extortion Insurance Coverage

Although the specific policy wording varies, many cyber policies provide coverage for extortion-related expenses and payments paid as a result of a cyber extortion threat.