We are currently looking for an Official SelfGrowth.com Guide to "Risk Management". If you have expertise in Risk Management and your own website and/or product for this topic, please review this form for complete details. The Official Guide Position is part of our Premium Placement Package
Oracle also use Industry Model Banks and other financial institutions are no exception to the mushrooming and burgeoning of software use in the age of the computer. Of course banks have been using computers to record their transactions for decades, way before the arrival of the World Wide Web, ... Views: 1077
By following these best practices, organizations can enjoy the benefits of outsourcing their enterprise cyber security, minimize the risks, and build fruitful, long-term relationships with trusted providers.
With the cyber security skills gap making it extremely difficult or even impossible ... Views: 1076
With no signs of slowing down of the coronavirus epidemic at the moment, investors have begun to worry about diminishing investment options in such a period of market volatility. Acquiring gold as an asset still retains a distinct attraction in India. Sophisticated complex the dynamics equation ... Views: 1072
Online shopping is booming, but customers will shun ecommerce if they do not feel their data is secure.
Just as “Video Killed the Radio Star,” ecommerce is making shopping malls go the way of the horse and buggy. In 2016, consumers reported making 51% of their purchases online, up from 48% in ... Views: 1071
The Yahoo hack demonstrates that cyber security has become a fundamental part of M&A transactions.
Data breaches and a failure to comply with governmental and industry standards can impact a company in many ways, as Yahoo is finding out the hard way. The company’s recent disclosure of a ... Views: 1071
Pressure to comply with regulation has always been one of the main drivers of changes in how financial services institutions manage data. And new regulations such as the Dodd-Frank Act, Solvency II, UCITS IV, Basel III, MIFID II and FATCA are proving to do just that. Irrespective of the size of ... Views: 1070
Cyber criminals don’t care who they hurt. This was made obvious during the rash of ransomware attacks on healthcare facilities this year, where hackers locked down electronic health records systems, putting patients at grave risk. There is great concern that the proliferation of Internet of ... Views: 1069
The Marriott Starwood breach, which exposed the personal data of 500 million guests, was not the largest data breach in terms of size; Yahoo still holds that dubious honor. However, because of the nature of the data stolen, it has the potential for a very long reach and highlights multiple cyber ... Views: 1068
Now It's Getting Personal: The FCA and Personal Conduct Authority Compliance Evidence Requirements
In UK Financial Services regulatory tumult, 2013 was obviously a tipping point with the UK regulator the Financial Conduct Authority (FCA), because the first time it pursued more civil and ... Views: 1065
Let’s face it. Only 10 out of 20 manage to stay in business and fewer manage to rake in profits. Why? Because in all probabilities they launched businesses for all the wrong reasons. Perhaps they had to encounter a number of risks in business, but lacked the art of business risk management and ... Views: 1065
As California goes, so does the rest of the country. While the California Consumer Privacy Act (CCPA), which was passed this summer and goes into effect in 2020, falls short of being an “American GDPR,” it clearly tore many pages from the far-reaching European data privacy law. Similar to the ... Views: 1064
The world of business and accounting needs the help of trustworthy and reliable professionals who can help make your business or company completely safe and fraud-free. This is where the responsibility of a Certified Fraud Examiner comes into play. True to its name, this examiner is specifically ... Views: 1064
U.S. federal government agencies are required to use the email security protocol DMARC to prevent email spoofing, but the overwhelming majority of federal contractors either don’t have it installed or don’t have it set up properly. NextGov reports:
Among the top 98 government contractors by ... Views: 1064
We all want a high-paying job.
Some work for it. Some think they deserve it, while others think they are entitled to it.
Whatever the case, there are some jobs in Asia that wouldn’t have been first into your mind. And there are some that you wouldn’t even have thought of.
One of the ... Views: 1064
Doxware Leaks Your Private Data if You Don’t Pay the Ransom
Ransomware began grabbing headlines about a year ago, after Hollywood Presbyterian Medical Center paid hackers thousands of dollars in ransom after it got locked out of its systems. This large payday apparently encouraged hackers to ... Views: 1062
Department of Defense contractors and their subcontractors have until December 31 to obtain DFARS compliance
Third-party data breaches are a serious problem, especially when highly sensitive data is involved – and our nation’s infrastructure, including our defense systems, are built and ... Views: 1054
FISMA, FedRAMP, NIST, DFARS, CJIS, HIPAA … Government compliance standards can seem like a veritable alphabet soup. Making matters even worse, a lot of them overlap, and many organizations aren’t certain which standards they need to comply with.
Even if your organization does not currently ... Views: 1053
Healthcare data security is under attack from the inside. While insider threats — due to employee error, carelessness, or malicious intent — are a problem in every industry, they are a particular pox on healthcare data security. Two recent reports illustrate the gravity of the ... Views: 1043
The ongoing COVID-19 pandemic has drastically impacted the way in which the majority of businesses function and many have chosen, or been forced, to work remotely to ensure the safety of staff and customers.
However, with the UK lockdown restrictions easing and the majority of businesses ... Views: 1043
A guide to advanced persistent threats (APTs), a highly sophisticated, highly destructive form of cyber attack.
What is an Advanced Persistent Threat (APT)?
“Advanced persistent threat” is a broad term used to describe a cyber attack where hackers covertly gain access to a system and ... Views: 1040
The NotPetya attacks weren’t as bad as WannaCry; they were worse, and we all need to start cooperating to prevent the next attack.
It’s looking more and more like last week’s NotPetya malware attacks, which infected computers around the world but hit Ukraine particularly hard, were designed ... Views: 1039
With an estimated 90% of cyber attacks caused by human error or behavior, it’s important to understand the most common cyber security mistakes your employees are probably making and know how to mitigate them.
Becoming victims of phishing schemes
Stolen login credentials are the most common ... Views: 1038
There is a lot of debate in engineering circles about who invented the electric generator and when. The prevailing theory is that Michael Faraday invented it in 1831. However, there are some who believe an Italian physicist named Aloisio Galvani conceived of it 41 years prior. Be that as it ... Views: 1035
Once a luxury item, free public WiFi has morphed into a standard service that consumers expect when patronizing everything from restaurants and retail stores to airports and hotels. Free WiFi users aren’t just checking Facebook or posting vacation photos to Instagram, either; all of us have sat ... Views: 1031
“ClearEnergy” May Have Been Fake News, But Threats Against ICS / SCADA Security Are Quite Real
Accusations of “fake news” rocked the cyber security industry last week after infosec provider CRITIFENCE implied that it had detected a brand-new “in the wild” ransomware variant called ClearEnergy ... Views: 1031
Business Continuity Management is a topic that should be of concern to any organization, whether non-profit or for profit, whether small or large, whether a startup or a well- established and mature business; it is basically an integral component to your Crisis and Risk Management planned ... Views: 1025
Just how expensive is Solvency II? Well, if the UK’s Financial Services Authority (FSA) is to be believed, the anticipated cost of new technology and external consultants necessary for compliance is likely to exceed US $3 billion. This is a substantial expense for many European insurance firms ... Views: 1025
The Federal Risk and Authorization Management Program, or FedRAMP, was designed to support the federal government’s “cloud-first” initiative by making it easier for federal agencies to contract with vendors that provide SaaS solutions and other cloud services. Unlike FISMA, which requires ... Views: 1025
Hacks in the City: Latest in String of Attacks at HBO Targets Company’s Social Media Accounts
HBO has had a rough summer, and things are getting progressively worse for the cable titan. The HBO hacks began in late June, when an individual hacker or group calling themselves “Mr. Smith” dumped ... Views: 1022
Cryptocurrencies such as Bitcoin and Ethereum have gone mainstream; it seems like everybody and their brother is looking to buy some crypto and get their piece of the digital currency gold rush. Hackers want a piece of it, too. In addition to hacking ICO’s and cryptocurrency exchanges, they’re ... Views: 1020
After the financial collapse in 2008 that was marked by the demise of some of the oldest financial firms in the banking industry, enterprise risk management has become a regulatory concern as well as a business concern. Assuring that the institutions which form the backbone of the country's ... Views: 1019
Originally posted on Money Metals Exchange
The news unfortunately just keeps getting worse for customers and creditors of Northwest Territorial Mint. The prominent bullion dealer located near Seattle, Washington filed for bankruptcy court protection at the end of March. The losses of ... Views: 1016
PCI DSS compliance is mandatory for any organization that accepts or processes payment cards, yet shockingly, a recent study by SecurityScorecard found that over 90% of U.S. retailers fail to meet four or more PCI DSS requirements.
Compliance with PCI DSS is not something to be taken lightly. ... Views: 1015
Hacks do not happen in a vacuum; if one computer on a network is compromised, all machines on that network are at risk. For this reason, both enterprises and individuals have a responsibility to implement cyber security best practices – and this does not mean installing anti-virus software and a ... Views: 1014
Don’t want your company to be the next Yahoo, Equifax, Deloitte, or SEC? Don’t ignore cyber risk management.
October is National Cyber Security Awareness Month in the U.S., which is quite fitting right now, being as barely a day is going by without yet another disclosure of a massive hack, ... Views: 1003
Ransomware isn’t a new threat. It first rose to prominence back in 2016, when Hollywood Presbyterian Medical Center shelled out $17,000 in bitcoin after an attack took the hospital offline. Since then, ransomware has only become more popular, especially for hackers targeting the healthcare ... Views: 1003
Yahoo is trying to pass the buck, but data breach responsibility starts at the top.
Who should be held responsible when a company’s systems get breached? Historically, the CIO, the CISO, or both have shouldered the lion’s share of data breach responsibility; well over half of security ... Views: 1003
Despite the availability of modern GRC software, many organizations still use spreadsheets to conduct IT compliance audits and other GRC activities. While spreadsheets are highly useful for many business functions, especially accounting, they are not GRC tools. Depending on spreadsheets to ... Views: 1002
Over several months last year, an international group of cyber bank robbers, possibly funded by the North Korean government, stole nearly $100 million, threw the integrity of a decades-old banking industry messaging system into question, and remained at large. Sound like the plot of the latest ... Views: 1001
K-12 schools, colleges, and universities are attractive targets for hackers. Their networks contain an enormous amount of identifying information on staff members, students, and students’ families, including names, birth dates, addresses, Social Security numbers, and even health records. ... Views: 1001
Why Your Employees Keep Clicking on Phishing Emails, and How You Can Stop It
The 2017 Verizon Data Breach Report is out, and it’s full of great news – if you’re a hacker. The study, which examined over 1,900 breaches and more than 42,000 attempts in 84 countries, showed that cyberespionage ... Views: 998
A strenuous regulation
Regulatory compliance costs money and may disruptively alter the business environment. Recent statements from a senior official of the United Kingdom’s financial services regulator and from the chief executive of the UK’s largest insurer gave impetus to this assertion – ... Views: 995
The Dangers of Reverse Phone Number Lookups
Harassment and bullying is an increasingly large problem across the United States, but how are you supposed to bring crank callers to justice if they are calling from an unfamiliar number? Fortunately, you can execute a Reverse Phone Number Search, in ... Views: 993
Internet-connected smart toys, a popular holiday gift item, have vulnerabilities that put both children and parents at risk of data breaches and identity theft.
Smart toys, which connect to the internet and offer children a personalized, interactive play experience, were a very popular gift ... Views: 993
Des Moines-based Voya Financial Advisors (VFA) has agreed to pay the U.S. Securities and Exchange Commission a $1 million penalty in the wake of an April 2016 breach that affected several thousand VFA customers. The SEC cyber enforcement action charged VFA with not having sufficient written ... Views: 989
Email marketing is big business. MarTech Advisor reports that it is the best-performing channel for a company’s ROI, and 61% of consumers prefer to receive offers via email, as opposed to only 5% who prefer social media offers. However, many organizations are concerned about how the GDPR, the ... Views: 988
The Mirai botnet DDoS attacks were the largest on record – and they were likely masterminded by teenagers.
In October, a massive DDoS attack on the Dyn DNS “Managed DNS” infrastructure brought down a number of major websites, including PayPal, Twitter, Amazon, Netflix, and Spotify. The attack ... Views: 987
The UK’s asbestos industry ended on 24th August 1999 after being used heavily from the 1950s to 80s. Over 20 years on, we’re starting to see the delayed latency period taking effect as asbestos deaths have peaked over the last year or so.
Asbestos was unknowingly dangerous to public health. ... Views: 987
Now that the year is coming to an end, all eyes are on what’s possibly around the corner. More attacks on cryptocurrencies? An escalation in attacks by state-sponsored cyber criminals? Chaos as the EU’s GDPR is implemented? In cyber security, only one thing is certain: It’s a continuous game of ... Views: 982
Tax season is stressful enough without having to worry about becoming the victim of a cyber crime. Here are three different tax phishing scams targeting employers, individuals, and even tax preparers that are currently making the rounds.
Employers: W-2 Phishing Emails
The W-2 phishing ... Views: 980