I recently moderated a discussion between Cygilant’s Dr. Ben Harrison, Global SOC & Security Operations and Barac CEO, Omar Yaacoubi, on the good, bad and ugly of encryption. Here are some of the questions asked of our experts.
Want to make sure your company is Federal Financial Institutions Examination Council (FFIEC) compliant? Then check out this guide to FFIEC data encryption standards, describing how you can ensure your organization complies with the FFIEC's encryption requirements.
Cybersecurity standards set the minimum requirements to protect your business systems and data. Complying with government and industry data security standards can cost a business millions – and the costs have been increasing in recent years. Concerns about technology and data security are also on the rise, which in turn has led to new rules and new regulations.
This week, as the World Economic Forum (WEF) met in Davos, Switzerland, cybersecurity took a key spot on the agenda. The World Economic Forum announced plans Wednesday for a new Global Centre for Cybersecurity. “The new Global Centre for Cybersecurity is designed as the first platform to tackle today’s cyber risks in a truly global manner,” Alois Zwinggi, managing director for the WEF, told CyberScoop. The new group is intended to facilitate increased public-private collaboration and information sharing on cyber threats. “Only through collaboration, information exchange and common standards can the global community successfully counter organized digital crime,” said a press release from the organization.
2016 is a new frontier for cybersecurity, but based on what happened in 2015, it’s safe to say that past incidents will continue this year. Here are four cybersecurity trends we expect to see in 2016:
The Growing Threat of Ransomware
Ransomware encrypts data on user machines to prevent access until the user pays to release the encryption. In other words, ransomware holds user data hostage and demands a ransom to free it. These attacks are becoming more and more common, even extorting money from police departments. Ransomware can affect both ordinary computers and phones—and it won’t be long until Internet of Things devices face the same alarming consequences.
The start of a new year provides an opportunity for organizations to review their operations—and strengthen digital security wherever it is lacking. Evidence suggests more hacking scandals will occur in 2016, and since no business wants to be the next headline-making hack victim, strong cyber defenses are a must. Here is a checklist of three cybersecurity tools IT teams should have in order to protect their computer assets this year.
Businesses process large amounts of sensitive data—customer credit card numbers, employee payroll information, trade secrets, and much more—making them targets for criminals. The safer the information storage, the better protected firms are from both cyber and physical compromises. Here are four ways to improve the storage of sensitive data: