Search Results for: data breaches Blog Post Cost of Data Breaches March 30, 2020 Data breaches can cause devastating financial losses and affect an organization’s reputation for decades. To get the accurate cost on... Blog Post Impact of Data Breaches on Businesses Reputation and How to Minimize Risk June 3, 2020 To avoid a major loss post a data breach, every organization must have an incident response plan and engage in... Blog Post Toyota Hit With Data Breaches March 31, 2019 Toyota just experienced three data breaches within five weeks. The first breach hit Toyota’s Australian subsidiary, while the second hit... Blog Post What Is The Average Time To Detect Data Breaches And How To Reduce It? November 3, 2020 On this information superhighway we’re on, data has become one of the most sought after and valuable assets. Whether it’s... Blog Post Detective Security Controls December 4, 2020 Organizations implement technical, administrative, and physical controls to maintain an adequate level of security posture. The nature of these controls... Blog Post Phishing Awareness Training Effective Only for a Few Months October 12, 2020 In the majority of cyber breaches, phishing attacks are the root cause. Phishing awareness training sensitizes a company’s employees to... Blog Post The Road Ahead: Cyber Security in 2020 and Beyond March 9, 2020 High profile data breaches have underscored the vulnerability of consumer information in an age of increasingly sophisticated cyber attacks. As... Blog Post Friday the 13th: luck, science, history, superstition and cyber security. September 13, 2019 Friday the 13th has a lot of people, especially in Western cultures, feeling anxious, but do not be scared ideas... Blog Post What Is eDiscovery and Why Is It Important To a Company? January 22, 2021 eDiscovery comes directly from the term “discovery” in legal proceedings, such as investigations, litigations, or Freedom of Information Act requests.... Blog Post Steve Durbin, Managing Director at the ISF Interview with Ondrej Krehel About Current Cyber Threats October 1, 2020 ISF Podcast: A Digital Forensics Specialist on Data Breaches It is an unavoidable fact that businesses and organizations’ sensitive information... Blog Post 2019: Top 19 Cyber Crime Statistics December 13, 2019 2019 has now almost come to an end, and statistics about Cybercrimes that happened until the end of 2019 are... Blog Post 5 ways To Improve Security Awareness Training August 20, 2020 The weakest link of the cybersecurity chain is the user. Therefore, expensive antivirus and software may not always hold up... Blog Post Employees at Large Organization Email Wrong People At Least 130 Times Per Week! February 3, 2020 Everyone has experienced sending out a wrong email to the wrong person or receiving a wrong email from the wrong... Blog Post Shadow IT: The Risks, How it Gets Exploited, Its Mitigation Steps January 7, 2021 Shadow IT refers to the use of IT applications, software, and hardware without the corporate IT department’s approval and knowledge.... Blog Post Does Your Company Have a Data Breach Plan? December 13, 2019 The average cost to deal with cybercrime for an organization was $13 million in the United States this year,...
Blog Post Cost of Data Breaches March 30, 2020 Data breaches can cause devastating financial losses and affect an organization’s reputation for decades. To get the accurate cost on...
Blog Post Impact of Data Breaches on Businesses Reputation and How to Minimize Risk June 3, 2020 To avoid a major loss post a data breach, every organization must have an incident response plan and engage in...
Blog Post Toyota Hit With Data Breaches March 31, 2019 Toyota just experienced three data breaches within five weeks. The first breach hit Toyota’s Australian subsidiary, while the second hit...
Blog Post What Is The Average Time To Detect Data Breaches And How To Reduce It? November 3, 2020 On this information superhighway we’re on, data has become one of the most sought after and valuable assets. Whether it’s...
Blog Post Detective Security Controls December 4, 2020 Organizations implement technical, administrative, and physical controls to maintain an adequate level of security posture. The nature of these controls...
Blog Post Phishing Awareness Training Effective Only for a Few Months October 12, 2020 In the majority of cyber breaches, phishing attacks are the root cause. Phishing awareness training sensitizes a company’s employees to...
Blog Post The Road Ahead: Cyber Security in 2020 and Beyond March 9, 2020 High profile data breaches have underscored the vulnerability of consumer information in an age of increasingly sophisticated cyber attacks. As...
Blog Post Friday the 13th: luck, science, history, superstition and cyber security. September 13, 2019 Friday the 13th has a lot of people, especially in Western cultures, feeling anxious, but do not be scared ideas...
Blog Post What Is eDiscovery and Why Is It Important To a Company? January 22, 2021 eDiscovery comes directly from the term “discovery” in legal proceedings, such as investigations, litigations, or Freedom of Information Act requests....
Blog Post Steve Durbin, Managing Director at the ISF Interview with Ondrej Krehel About Current Cyber Threats October 1, 2020 ISF Podcast: A Digital Forensics Specialist on Data Breaches It is an unavoidable fact that businesses and organizations’ sensitive information...
Blog Post 2019: Top 19 Cyber Crime Statistics December 13, 2019 2019 has now almost come to an end, and statistics about Cybercrimes that happened until the end of 2019 are...
Blog Post 5 ways To Improve Security Awareness Training August 20, 2020 The weakest link of the cybersecurity chain is the user. Therefore, expensive antivirus and software may not always hold up...
Blog Post Employees at Large Organization Email Wrong People At Least 130 Times Per Week! February 3, 2020 Everyone has experienced sending out a wrong email to the wrong person or receiving a wrong email from the wrong...
Blog Post Shadow IT: The Risks, How it Gets Exploited, Its Mitigation Steps January 7, 2021 Shadow IT refers to the use of IT applications, software, and hardware without the corporate IT department’s approval and knowledge....
Blog Post Does Your Company Have a Data Breach Plan? December 13, 2019 The average cost to deal with cybercrime for an organization was $13 million in the United States this year,...