Data breaches have always existed. They certainly predate computers, strange as that might seem, because a “data breach” is simply when information (usually of a sensitive nature) gets into the wrong hands. As long as humans have been storing information of any kind in any way, there have been other humans who have tried to […]
Non-malware attacks are on the rise. According to a study by the Ponemon Institute, 29 percent of the attacks organizations faced in 2017 were fileless. And in 2018, this number may increase up to 35 percent. So, what are non-malware attacks, how do they differ from traditional threats, why are they so dangerous, and what […]
Imagine a scenario in which an employee clicks a link in an e-mail and costs his or her employer $600,000. Unfortunately, this situation does not require one’s imagination. This is exactly what happened in Riviera Beach, Florida, when an employee clicked a link in an e-mail, and the government was crippled by a ransomware attack. […]
Whether it’s necessary to gain a promotion, maintain a security-related (and hard-earned) certification, finish a college or university degree program, or continue to demonstrate competence in their particular fields or industries, security professionals must go to live programs or take security education online courses on an ongoing basis.
The security world is full of professional certifications, ranging from the plethora of initials offered by ASIS, to homeland security designations, to a fraud examiner’s certification, to others related to crisis management, threat management, and even critical incident stress. Do the examination costs, recertification fees and costs, and study time make sense for security professionals […]
The federal Occupational Safety and Health Administration (OSHA) has created new guidelines for workplace violence prevention, measurement, and response. Its purpose is to help organizations address when a workplace violence perpetrator violates OSHA’s well-known General Duty Clause (GDC), which says employees must protect their employees from all types of physical harm.
Recent changes and pending new ones in travel restrictions for airline passengers coming from certain Middle East countries have banned the possession of laptop computers inside the cabin of the plane. More changes may be forthcoming, including adding 71 additional international airports to the current list.
It is important to determine suitable shelter-in-place locations and lockdown rooms in a facility before an incident. Knowing what characteristics make a room more conducive to shelter in place or secure in place (lockdown) helps to avoid danger during an incident.
When it comes to cybersecurity, two factors are coming together in a worrying way. One lurks in the results of a survey, conducted by the Association of Corporate Counsel, that shows employee error is the leading cause of data breaches. The other was revealed in research carried out by CompTIA, which discovered that almost half […]