Did you know…In 2015, there were 1,966,324 registered notifications about attempted malware infections that aimed to steal money via online access to bank accounts. In 2013 there were over 3 there were at least 72,758 phishing attacks worldwide!
This week marks Week 3 in the National Cyber Security Awareness Month (NCSAM). With the focus on Recognizing and Combating Cybercrime we have decided to focus on the underserved population, the Midmarket.
The US Middle Market, a.k.a. midmarket, in the US accounts for 1/3 of all jobs and 1/3 of private sector GDP and according to the National Center for the Middle Market, "If the U.S. middle market were a country, its GDP would rank it as the third-largest economy in the world".
New York State proposes game changing regulations for financial services organization and their suppliers
Till now our experience with insurance agencies has been fairly reactive and driven by IT. In the background we've been keeping an eye on the National Association of Insurance Commissioners (the NAIC) regulations and how they would impact Small and Medium Sized Businesses (SMB). In April the Cybersecurity (EX) Task Force (the Task Force) first presented the Insurance Data Security Model Law (the Model Law) it generated more than 40 comment letters from trade associations, market participants and regulators. insurance industry association . It appears that the, "something has happened, now can you help us fix, resolve, remediate it" approach to Data / Information or Cyber Security is about to change drastically.
Was your recent concert visit be annoyed by iPhones blocking the view? Apple may have the answer to your problems! Apple was awarded a US patent last week for a system could restrict your iPhone's ability to capture videos at concert venues by deploying an infrared signal to block your phone from recording
video at concerts.
Social engineering and phishing scams come in many different forms, infinite forms really as attackers are constantly coming up with new ways to trick victims. One flavor of attack has become increasingly popular because it is so effective: Business Email Compromise (BEC). In 2015 alone, BEC attacks cost companies over $1.2 Billion. A BEC attacks all have these phases:
Cyber Insurance is one of the more tricky subjects for companies to tackle today. It is becoming increasingly common among businesses of all sizes and is even beginning to be looked at as a requirement when partnering with other firms.
Topics: Cyber Insurance
What is it?
Let's start with the definition of authentication. Essentially the process of authentication involves proving you are who you say you are. There are three ways of authenticating:
Topics: Security technology
There are plenty of cyber security buzzwords flying around these days but few are heard as often as the phrase "zero-day attacks." In fact, it even made an appearance in our article on predicted threats for 2016. Experts see zero-day attacks becoming much more prevalent and continuing to do so throughout 2016. While many people have heard the phrase, we often find that unless the person is highly technical or a security professional, they don't know what it means. So we are here to help!