perm_phone_msgUNDER ATTACK? Chat With US

Month: January 2020

122 Results / Page 1 of 14

Background

todayJanuary 31, 2020

  • 4
close

Cyber insurance BCyber

How to Attain HITRUST Compliance in Less Time

At Armor, we’ve helped over 1,000 companies become more secure, many of which became HITRUST certified. We’ve learned that while HITRUST compliance is complicated, you can become HITRUST certified in less time with the right approach. Unfortunately, some infrastructure companies state in their marketing that all you need to do ...

todayJanuary 30, 2020

  • 8
close

Cyber insurance BCyber

Cyber Security: Don’t Ignore Data Integrity

Cyber security is an enabler of the digital transformation of business. While Information Technology allows the rapid delivery of goods and services and the real-time understanding of customers, markets and industries, security enables companies to use technology by ensuring that data remains protected. Confidentiality and availability are two essential elements ...

todayJanuary 30, 2020

  • 6
close

Ransomware BCyber

Ransomware devastated cities this year. Officials hope to prevent a repeat in 2020 – CNET

Ransomware attacks against local governments spiked in 2019, researchers found.  When Hurricane Sandy hit the East Coast in 2012, it caused a power outage affecting nearly 8 million homes and workplaces, including the office of Manhattan District Attorney Cyrus R. Vance Jr. The building’s computers couldn’t turn on, but police were ...

todayJanuary 29, 2020

  • 8
close

Cyber insurance BCyber

Fraud Is Bad Business: The Impact on Customer Experience

For customer experience (CX) programs to be effective, companies need to collect customer information. But the more data organizations collect, the more that data is at risk. Failure to protect customer information means not only a loss of customer trust, but can be costly for consumers and organizations alike. Fraud ...

todayJanuary 28, 2020

  • 9
close

Ransomware BCyber

Iranian hackers deploy new ZeroCleare data-wiping malware | ZDNet

This ebook, based on the latest ZDNet/TechRepublic special feature, offers a detailed look at how to build risk management policies to protect your critical digital assets. Security researchers from IBM said today they identified a new strain of destructive data-wiping malware that was developed by Iranian state-sponsored hackers and deployed ...

todayJanuary 27, 2020

  • 7
close

Cyber insurance BCyber

Cybersecurity insiders say big companies abuse NDAs to avoid disclosing data breaches – Business Insider

Cybersecurity insiders have told Business Insider that non-disclosure agreements allow European firms to “make a mockery” of Europe’s data laws, letting them cover up security breaches and potentially avoid millions of dollars in fines. Europe’s GDPR legislation, which came into force in May 2018, requires firms to disclose major data ...

todayJanuary 27, 2020

  • 8
close

Ransomware BCyber

‘Ambitious’ PayPal phishing scam seeks to steal more than login credentials – SiliconANGLE

A newly discovered PayPal Inc. phishing scam is not only targeting login credentials but also personally identifiable information and payment card data. Discovered and publicized Dec. 20 by security researchers at ESET spol s.r.o., the phishing campaign targets users with crafted emails that claim that the PayPal account belonging to a user ...