We are currently looking for an Official SelfGrowth.com Guide to "Risk Management". If you have expertise in Risk Management and your own website and/or product for this topic, please review this form for complete details. The Official Guide Position is part of our Premium Placement Package
Cryptocurrencies such as Bitcoin and Ethereum have gone mainstream; it seems like everybody and their brother is looking to buy some crypto and get their piece of the digital currency gold rush. Hackers want a piece of it, too. In addition to hacking ICO’s and cryptocurrency exchanges, they’re ... Views: 990
The General Services Administration (GSA) is planning to tighten up federal contractor cyber security requirements regarding sensitive non-classified data, according to a Federal Register Notice dated January 12. The rules would cover internal contractor systems, external contractor systems, ... Views: 793
Both the SEC and FINRA have indicated that they will put heavy emphasis on cyber security enforcement throughout 2018. While FINRA is explicit — among other things, it publishes a cyber security checklist and a detailed report on best practices — the SEC’s guidance is far more general. This ... Views: 1105
The U.S. Securities and Exchange Commission plans to update its six-year-old guidelines regarding data breach notification and cyber risk disclosure, Bank Info Security reports:
The agency has indicated that it expects to refine guidance around how businesses disclose cybersecurity risks to ... Views: 858
Over the summer, Gartner announced that it was moving its focus away from GRC and launching a new Magic Quadrant for integrated risk management, or IRM:
IRM enables simplification, automation and integration of strategic, operational and IT risk management processes and data. IRM goes beyond ... Views: 1063
About 10 to 20 years ago, not all companies are requiring background checks on their applicants, whether it be a social media screening or not. Today, when you come in for an interview with a company, you’ll be asked to sign a consent that they will do a background check on you.
While some ... Views: 1773
Now that the year is coming to an end, all eyes are on what’s possibly around the corner. More attacks on cryptocurrencies? An escalation in attacks by state-sponsored cyber criminals? Chaos as the EU’s GDPR is implemented? In cyber security, only one thing is certain: It’s a continuous game of ... Views: 954
The year is going to end up quite soon, and like every other place in Australia, your workplace too must be decked up in the flair of New Year. Be it the decoration or planning for food for the upcoming party, everyone has started contributing ideas for making the party a bit more unique than ... Views: 1674
The Uber breach, which compromised the data of 57 million drivers and customers worldwide, has just gone from bad to worse. Not only did the company wait for a year to disclose the hack, it scrambled to cover it up by forking over $100,000 in hush money to the hackers – which it funneled through ... Views: 842
Cyber criminals upped their game in 2017, launching everything from cryptocurrency thefts to international ransomware attacks. Here, we examine seven of the worst cyber attacks of 2017.
1. The Equifax Breach
Any list of the worst cyber attacks of 2017 would be remiss if it did not include ... Views: 926
Organizations have until May 25, 2018, to comply with the EU’s new General Data Protection Regulation (GDPR). Arguably the most comprehensive, far-reaching data privacy law passed to date, the GDPR grants European consumers numerous new data privacy rights and places new data governance ... Views: 945
The rise in the number of companies that are hiring social media screening companies to help them in their hiring process from 2006 has increased to an incredible 500%.
Although there are still some doubts, one should ask themselves if they really need to have their future employees undergo a ... Views: 1174
The deadline for GDPR compliance is right around the corner; is your company ready? Here’s what you need to know about this important new data protection law and what your organization must do to prepare for it.
What is GDPR?
The General Data Protection Regulation, or GDPR, was adopted by ... Views: 819
Clothing retailer Forever 21 suffered a POS system breach in an undisclosed number of stores from March to October 2017, the company announced last week. The Forever 21 breach was discovered by a third party and involved hackers taking advantage of POS systems that were not encrypted.
There ... Views: 1063
After last year’s U.S. presidential election, many businesses eagerly awaited a new “era of deregulation” that would allegedly result in relaxed compliance requirements – and lower costs. Although some regulations have been relaxed or even repealed, IT compliance is as time-consuming and ... Views: 1165
Social Media Security Matters; Just Look at the Trump Twitter Account Debacle
Last week’s Trump Twitter account incident – where the president’s Twitter feed was deactivated for 11 minutes – was fodder for many late-night television jokes. All kidding aside, though, enterprise social media ... Views: 880
What NOT to do to avoid lawsuits when hiring social media screening companies
By now, you already know how important social media screening is when it comes to hiring people in your company. As much as possible, you want to make sure that your brand will stay intact and you will do anything ... Views: 1156
Ensure a secure cloud migration with these simple, proactive cyber security tips
Enterprises have much to gain by migrating to the cloud, which is why the U.S. government has adopted a “cloud-first” initiative. Cost savings and the ability to scale up and down quickly as organizational needs ... Views: 927
The Federal Risk and Authorization Management Program (FedRAMP) was designed to support the federal government’s “cloud-first” initiative by making it easier for federal agencies to contract with cloud providers. Like FISMA, DFARS, CJIS, and HIPAA, FedRAMP’s security controls are based on NIST ... Views: 780
Being the victim of a hit-and-run is an extremely stressful experience. In addition to any physical or emotional injuries you sustain, you’ve need to consider the damages done to your vehicle. Given the situation, you may not be able to concentrate and think about all the things you need to do. ... Views: 1243
FISMA, FedRAMP, NIST, DFARS, CJIS, HIPAA … Government compliance standards can seem like a veritable alphabet soup. Making matters even worse, a lot of them overlap, and many organizations aren’t certain which standards they need to comply with.
Even if your organization does not currently ... Views: 1024
Don’t want your company to be the next Yahoo, Equifax, Deloitte, or SEC? Don’t ignore cyber risk management.
October is National Cyber Security Awareness Month in the U.S., which is quite fitting right now, being as barely a day is going by without yet another disclosure of a massive hack, ... Views: 979
By following these best practices, organizations can enjoy the benefits of outsourcing their enterprise cyber security, minimize the risks, and build fruitful, long-term relationships with trusted providers.
With the cyber security skills gap making it extremely difficult or even impossible ... Views: 1048
Uninsured / Underinsured Motorist Coverage
In California, the law requires you to have Uninsured / Underinsured Motorist coverage as part of the state’s mandatory Liability Insurance Coverage.
Uninsured/Underinsured Motorist Coverage is intended to cover accidents when ... Views: 1274
The SEC hack has pitched the international finance world into turmoil as Wall Street's top regulator admits to not having secured its own systems.
Move over, Equifax; the SEC hack may have just stolen your thunder. Less than two weeks after Equifax disclosed that it had been breached, ... Views: 904
Hacks do not happen in a vacuum; if one computer on a network is compromised, all machines on that network are at risk. For this reason, both enterprises and individuals have a responsibility to implement cyber security best practices – and this does not mean installing anti-virus software and a ... Views: 980
The Equifax breach isn’t the largest data breach, but it is one of the most troubling because of its massive scope, the nature of the information stolen, and the absolutely awful way in which it was handled.
While Hurricane Irma dominated the national news late last week, a man-made disaster ... Views: 1460
A home is supposed to be your place to go that is safe and comfortable for you and your family to unwind, relax, and live happily. But statistics from the FBI indicate that about three out of four homes will be broken into across the U.S. within the next 20 years. The U.S. Department of Justice ... Views: 1563
Governance, risk, and compliance should be at the heart of AWS security procedures
Another day, another AWS security breach, and this one is particularly bad because of the extraordinarily sensitive nature of the data that was compromised: Over 9,000 documents containing personal data on job ... Views: 909
Several high-profile breaches involving misconfigured Amazon Web Services servers have made the news. Here are three best practices to ensure AWS S3 security.
Amazon Web Services (AWS) is the undisputed leader in the cloud services market. Large and small organizations alike flock to AWS ... Views: 1224
Whether you’re lucky enough to be fulfilling your life’s calling or just appreciating the opportunity to make some money, work brings value and meaning to life. Sadly, when an accident or injury occurs, it can make working difficult or even impossible. Depending on the extent of the injury, you ... Views: 1686
Hacks in the City: Latest in String of Attacks at HBO Targets Company’s Social Media Accounts
HBO has had a rough summer, and things are getting progressively worse for the cable titan. The HBO hacks began in late June, when an individual hacker or group calling themselves “Mr. Smith” dumped ... Views: 993
HBO Hack Targeted Valuable Intellectual Property and Company Secrets
Corporate espionage and the theft of intellectual property and company secrets have gone cyber. The latest victim is cable network HBO and its flagship series Game of Thrones. The HBO hack, perpetrated by a hacker or group ... Views: 927
New Anthem breach underscores the need to manage cyber risk throughout the enterprise ecosystem
Anthem – yes, that Anthem – has been hacked again. About a month after the beleaguered health insurer agreed to fork over a record-setting $115 million to settle a class action lawsuit related to ... Views: 950
Is your business secure? It may not be. Many unscrupulous individuals are operating online looking for new ways to exploit honest people.
I was recently pulled into a scam enacted by someone yet to be identified via a freelance work website. Because of how personally this affected me and my ... Views: 1293
In one of our recent blog posts, we told you about the questions you need to ask your social media background check company before availing their services. So, what happens after they answer your questions? Do you say yes immediately? Of course not.
In this blog post, we will concentrate on ... Views: 1213
Department of Defense contractors and their subcontractors have until December 31 to obtain DFARS compliance
Third-party data breaches are a serious problem, especially when highly sensitive data is involved – and our nation’s infrastructure, including our defense systems, are built and ... Views: 1027
Initial Coin Offerings (ICOs) powered by the Ethereum blockchain platform are the hottest thing going right now, but are they secure? On July 24, 2017, the second Ethereum ICO hack in a week hit the news, as digital wallet firm Veritaseum disclosed to Bleeping Computer that a hacker stole ... Views: 1249
Verizon, Trump Hotels, and the RNC are Among the Recent Victims of Third-Party Breaches
Even if your own cyber security is up to snuff, your organization could be at risk of third-party breaches if your business partners are not as diligent as you are. Verizon just learned this lesson the ... Views: 928
People often think that social media is pure harmless fun, but for many companies, it is a very useful resource to know more about their prospective employees. Around 90% of hiring managers look at a candidate’s online behavior and base their decisions on what they find. Social Screening has ... Views: 1548
SEC cyber security enforcement is set to intensify in light of recent global attacks and new enforcement chiefs
Public companies and firms operating in regulated industries, especially finance, should expect more SEC cyber security enforcement in the wake of new and emerging threats, like ... Views: 890
The NotPetya attacks weren’t as bad as WannaCry; they were worse, and we all need to start cooperating to prevent the next attack.
It’s looking more and more like last week’s NotPetya malware attacks, which infected computers around the world but hit Ukraine particularly hard, were designed ... Views: 1008
Business Continuity Management is a topic that should be of concern to any organization, whether non-profit or for profit, whether small or large, whether a startup or a well- established and mature business; it is basically an integral component to your Crisis and Risk Management planned ... Views: 992
Hiring a third party to run a social media background check on your applicants may seem unethical for some. A number of people think that having an online investigation is like spying and that these subjects are entitled to have their private lives that are separate from their professional ones. ... Views: 881
The cyber security skills gap is real and growing; there simply aren’t enough cyber security employees to go around.
Cyber crime is rapidly escalating, and board rooms are taking notice. KPMG’s 2017 U.S. CEO Outlook survey shows cyber security risks to be among CEOs’ top concerns, yet only ... Views: 940
White-Hat Hackers Are Already Being Caught in the Cryptocurrency Regulation Net
Cryptocurrencies have long been associated with cyber crime. The cryptocurrency Bitcoin was the de facto currency of the notorious online black market Silk Road, it remains the preferred payment method on the Dark ... Views: 1629
Cryptocurrency mining malware may end up being a bigger problem than WannaCry
Organizations that think they dodged a bullet when their older systems did not fall prey to the WannaCry ransomware may want to think again. Weeks prior to the WannaCry attacks, a group of hackers was taking ... Views: 1317
The Healthcare Industry Cybersecurity Task Force’s report on healthcare cyber security echoes a similar study on medical device security issued by Synopsys and the Ponemon Institute.
On the heels of a damning study by Synopsys and the Ponemon Institute, which provides a blow-by-blow ... Views: 907
A new report by Synopsys and the Ponemon Institute finds that medical device security is plagued by a lack of standards, testing, and accountability.
Healthcare organizations tend to focus their cyber security efforts on HIPAA compliance, protecting patient data, and defending against ... Views: 912
The recent WannaCry ransomware attacks put cyber security on the front page of every newspaper in the world. Now, everyone knows what ransomware is and how destructive it can be, but will anything change? Following are four critical lessons that both organizations and individuals should take ... Views: 877