We are currently looking for an Official SelfGrowth.com Guide to "Risk Management". If you have expertise in Risk Management and your own website and/or product for this topic, please review this form for complete details. The Official Guide Position is part of our Premium Placement Package
We are living in a cloud-first world; cloud services, including storage services and SaaS providers, are wildly popular. Unfortunately, third-party vendor breaches are at epidemic levels, and new regulations such as the EU GDPR are seeking to hold organizations accountable if third-party ... Views: 906
Being proactive in your security practices is essential today with the risk of security attacks across all industries. Conducting penetration testing consulting services regularly is an important step towards keeping your organization as safe as possible from cyber-attacks. Customers that ... Views: 906
Social Media Security Matters; Just Look at the Trump Twitter Account Debacle
Last week’s Trump Twitter account incident – where the president’s Twitter feed was deactivated for 11 minutes – was fodder for many late-night television jokes. All kidding aside, though, enterprise social media ... Views: 903
Owning a home comes with a ton of responsibilities, and topping this list is ensuring that it is well protected. After all, it is among your most significant investments. While there are many ways to safeguard your home such as having a dog or joining a neighborhood watch group, a home security ... Views: 900
IoT manufacturers should take heed from the recent Mirai DDoS attacks.
Late last year, a widespread attack on Dyn DNS “Managed DNS” infrastructure wreaked havoc across the internet and brought down a number of major websites, including PayPal, Twitter, Amazon, Netflix, GitHub, and Reddit. ... Views: 898
Risk exists in the operations and decisions of almost all organizations. Organizations of all shapes and sizes can benefit from undertaking systematic risk management processes, including governments, professional associations, and charities. This Hub will focus on profit-driven businesses and ... Views: 897
K-12 school systems, colleges, and universities are being increasingly targeted by hackers, yet education cyber security is as woefully lacking as other industries, as these recent incidents illustrate:
• In November 2016, Columbia County School District in Georgia admitted to a breach of ... Views: 894
How RegTech Simplifies Governance, Risk, and Compliance
Complying with standards such as HIPAA, PCI DSS, FISMA, and SSAE 16 SOC reporting is complex, costly, and time-consuming, especially for organizations that must comply with multiple standards. You may have heard the term “RegTech” ... Views: 892
Facebook is the most widely used social media network. There are almost 2 billion monthly active users of Facebook according to stats. If you talk with 100 people around you, you will find that almost 92 people are using Facebook.
Many celebrities and brands have their pages and accounts on ... Views: 891
Confused about PCI DSS compliance and what your business needs to do to comply with it? This article will explain PCI DSS and the importance of complying with this important information security standard.
What is PCI DSS?
PCI DSS stands for the Payment Card Industry (PCI) Data Security ... Views: 889
If you have no idea on how to go about filling a claim when it comes to insurance, then you will end up with a lot of stress. The process can be one of the most overwhelming processes you can go through. The worst part is when you file a claim and it is not paid. This is common especially when ... Views: 888
The U.S. Securities and Exchange Commission plans to update its six-year-old guidelines regarding data breach notification and cyber risk disclosure, Bank Info Security reports:
The agency has indicated that it expects to refine guidance around how businesses disclose cybersecurity risks to ... Views: 886
The rise of ecommerce, particularly mobile ecommerce, has fundamentally altered both consumer and business buying habits. Organizations are embracing digital transformation in an effort to appease modern buyers and enhance the customer experience while cutting costs and improving efficiency. The ... Views: 884
State officials expressed grave concerns about election hacking the day after Special Counsel Robert Mueller handed down indictments of 13 Russian nationals on charges of interfering with the 2016 presidential election. The Washington Post reports:
At a conference of state secretaries of ... Views: 884
Last week, the NIST Small Business Cybersecurity Act (S. 770) passed the U.S. Senate and was sent to the White House, where the president is expected to sign it into law shortly. The bipartisan measure directs NIST to provide resources to small businesses to help them implement the NIST ... Views: 883
Both brick-and-mortar and ecommerce retail stores make attractive targets for hackers, especially during the holidays.
Retail stores are favorite targets of cyber criminals, especially during the holiday shopping season, when brick-and-mortar and ecommerce stores are flooded with customers, ... Views: 881
Many businesses take the festive period as a well-earned holiday. Unfortunately, criminals generally don’t. In fact, it’s one of the busiest times of the year for them. It’s therefore important to make sure that your retail business is safe before you go off on your festive ... Views: 880
Yes it’s time to hedge your risk, but don’t wait for that perfect moment. Both the economy and stock market are showing signs of stress. Here's what you need to know.
Here are some of the excuses we hear from professional money managers and risk managers for not having a hedging program ... Views: 879
Asbestos is a mineral whose main characteristics are thermal isolation and highly resistant to fire. Asbestos toxicity is related to its fibrous structure, Which is globally tested and recognised as a first level Human carcinogen, found naturally in rocks and widely used by modern industry. ... Views: 874
The ongoing crisis of COVID-19 compels employers around the globe for introducing programs to support their employee’s work remotely. With the Centers for Disease and Prevention predicting that COVID-19 impacts will continue until 2021, remote work is likely to become a new standard as ... Views: 873
Quality Assurance starts from the very first stage of software development and experienced QA has to be actively involved in each stage of the Software Development Life Cycle. Taking QA services from a third party service provider would be a great decision in many senses. However, you have to ... Views: 871
Solvency II has 3 pillars - Pillar I that address capital requirements, Pillar II that is focused on workflow, governance and audit, while Pillar 3 details the framework for reporting. Unsurprisingly, Pillar I has attracted the most attention with insurers evaluating their entire business to ... Views: 869
In a new report, UC Berkeley’s Center for Long-Term Cybersecurity offers suggestions to President Elect Trump.
Now that the election is over, the nation’s attention has turned to President Elect Donald Trump and what a Trump Administration will mean for cyber security. Notably, information ... Views: 869
The WannaCry ransomware attack was the end result of years of ignorance on the part of governments, private-sector firms, and the public regarding how serious cyber threats have become.
The 2016 Shadow Brokers NSA hack came home to roost in a big way last week, when a code execution ... Views: 869
No organization wants to think that one of its own trusted employees is out to get the firm. However, a study by Intel found that 43% of data losses are the result of “internal actors” – and about half of these incidents were due to the intentional acts of malicious insiders, not accidents or ... Views: 868
The Uber breach, which compromised the data of 57 million drivers and customers worldwide, has just gone from bad to worse. Not only did the company wait for a year to disclose the hack, it scrambled to cover it up by forking over $100,000 in hush money to the hackers – which it funneled through ... Views: 868
Healthcare is one of the most regulated industries in the U.S. HIPAA, or the Health Insurance Portability and Accountability Act of 1996, requires healthcare organizations and their third-party service providers, such as labs and billing companies, to have data security measures in place protect ... Views: 867
In a heated political climate, even the appearance of vote hacking could threaten our nation’s democracy.
The most contentious issue this election season may not be immigration or minimum wage laws but cyber security; specifically, the specter of vote hacking. Shortly after the discovery that ... Views: 866
Arranging insurance for a small business can be a highly complex undertaking, and may require a considerable amount of thought and planning.
Small business insurance is not like most other forms of insurance. If you are looking to insure your home or your car, then there is something ... Views: 865
What will the state of cyber security look like under a Donald Trump administration?
The election is over, the votes have been counted, and thankfully, other than a few isolated reports of malfunctioning voting machines, Election Night was unremarkable from a cyber security perspective. Now, ... Views: 865
Phishing attacks are big business. The FBI estimates that business email compromise, a highly targeted form of phishing, costs U.S. businesses half a billion dollars a year, and the Verizon 2018 Data Breach Investigations Report found that 90% of cyber attacks began with a phishing ... Views: 864
The deadline for compliance with the EU’s General Data Protection Regulation (GDPR) is fast approaching, and an astounding number of organizations are woefully unprepared to meet it. A new survey of IT decision-makers by Crowd Research Partners found that a whopping 60% of organizations will ... Views: 862
There has never been a power outage in the U.S. due to a cyber attack, but it happened in Ukraine over the Christmas holidays in 2015, and there have been attempts to breach U.S. power companies and hack the power grid.
In March, the U.S. Department of Homeland Security issued an alert ... Views: 859
In the hit USA Network series Mr. Robot, a rogue group of hacktivists target major corporations and the government. In a recent episode, the group enlists the help of a malicious insider to hack the FBI. Sound far-fetched? Maybe not: Around the same time this episode aired, an anonymous group of ... Views: 859
Don’t let your business get caught on a spear phisher’s hook.
Like regular phishing, spear phishing involves sending legitimate-looking but fraudulent emails asking users to provide sensitive information and/or initiate wire transfers. However, while regular phishing emails are sent out en ... Views: 858
The difference between penetration tests and vulnerability scans is a common source of confusion. While both are important tools for cyber risk analysis and are mandated under PCI DSS, HIPAA, and other security standards and frameworks, they are quite different. Let’s examine the similarities ... Views: 857
Information is power, in every situation for everyone at any point of time. In today’s world, there are circumstances where people have to work in high risk environment. In such scenarios, it is of utmost importance that the person who is working alone should have a way to communicate with his ... Views: 857
Construction risks are often ignored by both employees and employers, for example, they forget about the need to buy protective equipment. However, they are very dangerous as some of them can cause life-threatening accidents. Therefore, it is important to reduce the safety risk at the ... Views: 849
Cyber security is a continuous game of Spy vs. Spy. Every time a new technology is introduced, the potential attack surface expands. The moment one vulnerability is patched, hackers find another way in. Keeping up can feel overwhelming, even for security professionals.
In no particular order, ... Views: 847
The deadline for GDPR compliance is right around the corner; is your company ready? Here’s what you need to know about this important new data protection law and what your organization must do to prepare for it.
What is GDPR?
The General Data Protection Regulation, or GDPR, was adopted by ... Views: 847
While healthcare providers and healthcare industry vendors cannot afford to ignore HIPAA compliance, a new threat emerged in 2016 and has only gotten bigger in the past year: ransomware attacks on hospitals and healthcare providers that are not seeking to breach patient information but instead ... Views: 846
In a previous blog, we discussed the recent epidemic of ransomware attacks on U.S. healthcare organizations and the importance of the industry taking this very serious cyber security threat – and information security in general – seriously. The good news is that although a ransomware attack can ... Views: 842
If IoT cyber security concerns aren’t addressed, consumers will reject self-driving cars and other smart devices.
Shortly after rideshare company Uber launched a pilot test of self-driving cars in Pittsburgh, competitor Lyft made the bold prediction that most of its cars would be self-driving ... Views: 841
Organizations can no longer depend on passwords alone to protect their systems and data, especially since 25% of employees admit to using the same password for all of their accounts, at home and at work, and stolen account credentials are hackers’ preferred way to break into enterprise systems. ... Views: 840
Baseball may be America’s favorite pastime, but from the Black Sox scandal to Pete Rose to the “Steroid Era,” cheating schemes have long tarnished the game. Sadly, it was only a matter of time before cheating went high-tech. Last summer, former St. Louis Cardinals executive Chris Correa was ... Views: 835
Let’s face it In today's digital world our work, personal life, and finances all have begun to gravitate towards the world of the internet, mobile computing, and electronic media. But, this widespread situation makes us prone to more vulnerabilities and risks than ever to malicious attacks, ... Views: 834
Catastrophic events can transpire at any moment, and if one happens to affect you, will you be prepared to deal with the fallout? Every diligent prepper should have a “bug-out bag,” which is basically a portable survival kit containing essential items that will come in handy in disasters and ... Views: 825
The General Services Administration (GSA) is planning to tighten up federal contractor cyber security requirements regarding sensitive non-classified data, according to a Federal Register Notice dated January 12. The rules would cover internal contractor systems, external contractor systems, ... Views: 816
Risks are expected and are topic to impact any kind of small, medium or large company.
It's essential that organizations continue to determine, notice and control the occurrence of danger within their particular organizations. It's also remember that even with the best of risk-based ... Views: 813
Innovation ceases to amaze us, we've experienced too much of it. So much, in fact, that for most of us, for the market you will operate in, innovation has become a common thing. Hearing at lunch from a colleague about how someone has invented something to launch into space, creating a new gadget ... Views: 812