Blog Archives

IoT and Your Security

How IoT is Jeopardizing Your Business Security

With the rising wave of IoT devices, businesses everywhere are faced yet with another challenge: to ensure an adequate security level while also continuously integrating new technologies.

By Jean Nicolas Piotrowski, ITrust.

With the rising wave of Internet of Things (IoT) devices,

Read more ›

Posted in Mobile, Risk Management, Vendor Compliance
Tags: , , , , ,

Cybersecurity Attack Surface – Part 1

Redefining The Cybersecurity Attack Surface, Part 1

by | Jan 4, 2016 | CYBERGOVERNANCE Journal

When discussing an organization’s security posture, “attack surface” is the common term used to describe the aggregate vulnerabilities that the firm exhibits.

Read more ›

Posted in cybergovernance, Cybersecurity, Fraud, Governance, Hacks, ID Theft, Malware, Malware & Other Threats, Phishing, ransomware, Regulatory, Risk Management
Tags: , , , , , , , , , ,

The Hackers Who Grinched Christmas

Kids’ smart toys are big holiday targets for hackers

 by: Mark Pribish, VP / ID Theft Practice Leader – MIS, Inc.

Read more ›

Posted in Compliance, Content, Cybersecurity, Encryption, Hacks, Malware, Risk Management
Tags: , , , , , , , ,

2016 Cybersecurity Predictions: Wearables, Automobiles, & ID-theft

Consumers, business benefit from huge growth in tech and apps – so do ID-theft criminals

To help you protect and mitigate the potential negative impact of the “internet of things,” which brings more users,

Read more ›

Posted in Cybersecurity, Hacks, ID Theft, Mobile, Risk Management
Tags: , , , , , , ,

Lost Devices Can Lead to Breaches

Lost electronic devices can lead to data breaches

by Mark Pribish for Merchants Information Solutions, Inc.
lost_deviceslost_devicesNearly half of all data breaches occur when ID-theft criminals access information because someone lost a device.
In fact, 41 percent of all data breach events from 2005 through 2015 were caused by lost devices such as laptops,

Read more ›

Posted in Breach, Compliance, Content, Encryption, Fraud, Incident Response, Insider Threats, Mobile, Risk Management
Tags: , , , , , , , , ,

Multi-Factor Authentication is a Must

Why Your Business Needs Multi-Factor Authentication

July 23, 2015
Multi-factor Authentication helps keep your eggs out of a single basket.Multi-factor Authentication helps keep your eggs out of a single basket.

There’s a good reason why leading SMBs are using multi-factor authentication (also known as “two factor authentication”,

Read more ›

Posted in Compliance, Content, Cybersecurity, Layered Defense, Multi-Factor Authentication, Phishing, Privacy
Tags: , , , , , , ,

Why Cyberfy Beats the Competition

Cyberfy: The Future of Smart Phone ID Authentication

by: Yona Fink, CEO Cyberfy

The field is quickly filling up with biometric ID authentication apps, but Cyberfy still holds a lead. Why?

Apple’s Touch ID and EyeVerify (both of which I know,

Read more ›

Posted in Content, Cybersecurity, Encryption, Fraud, Layered Defense, Legal, Mobile, Risk Management
Tags: , , , , , , , ,

BYOD and Mobile Apps

The security threat of BYOD and unvetted mobile apps

by Suhail Nanji, Area Director, Southeast Region, SMLR Group

It’s likely happening in your organization, whether you have an official policy or not. Employees are probably running software applications on their own mobile devices or employer-issued devices to access company information.

Read more ›

Posted in Compliance, Content, Cybersecurity, Hacks, Incident Response, Insider Threats, Malware, Malware & Other Threats, Mobile, Regulatory, Vendor Compliance
Tags: , , , , , , , , , , ,

Mobile Cyberattacks Escalating

Mobile Cyberattacks A Concern for Companies as they Switch to Mobile-first Computing

Steve Rosenbush for WSJ

Cyberattacks on mobile devices are accelerating, just as some companies are beginning to adopt a mobile-first approach to computing. That’s not surprising, but it’s up to CIOs and CISOs to address the security problems without derailing an important evolution of the business.

Read more ›

Posted in Compliance, Cyberattack, Cybersecurity, Incident Response, Mobile, Risk Management
Tags: , , ,

Malware Infects Apple iOS Devices

Malware Threat: Non-Jailbroken iOS Devices Targeted by Trojanized Mac Apps
By Mathew J. Schwartz, November 6, 2014. Follow Mathew J. @euroinfosec

Apple iOS and Mac OS X devices are susceptible to a previously unseen malware family that spreads via a third-party Chinese app store,

Read more ›

Posted in Cybersecurity, Fraud, Incident Response, Malware, Malware & Other Threats, Mobile, Trojan
Tags: , , , , , , ,

Visit Us On TwitterVisit Us On FacebookVisit Us On LinkedinVisit Us On Google Plus

Keep Current with What’s New in Cybersecurity

Email Address:


Cybersecurity News Daily

Provides a daily summary of what's news in Cybersecurity


Recent Tweets



Get every new post delivered to your Inbox

Join other followers: