Cross cultural aspects of breach response strategies

global-data-breach-response

The phones are ringing off the hook at headquarters, your web site traffic is exploding and your email boxes have reached capacity. Why?  Your enterprise systems have been hacked, exposing millions of confidential customer personal and financial records. It’s impossible to determine where in the world the hack originated, but the implications are surely global […]

Study: Hospitals dramatically increase ad spend following data breaches

healthcare-data

Determining the actual cost of a data breach is difficult and often leads to heated discussions in security circles. How do you determine how many customers who left (following a breach) wouldn’t have left anyway? Perhaps they already were upset with the organization for some other reason. How do you know if a sales decline […]

Data masking for GDPR: A force for positive change

Hiding-behind-mask

If the words General Data Protection Regulations (GDPR) are enough to get your pulse racing, you are not alone. The GDPR, due to come into force on 25 May this year, is going to have a significant, permanent and far-reaching impact on any business that holds data on EU citizens, including organisations based outside of […]

GDPR raising cybersecurity awareness among EU business leaders

EU-flag

As if the daily beating of data breach news wasn’t enough reason to bring the stark reality of cyber risks to the attention of corporate leaders, here comes the European Union’s General Data Protection Regulation (GDPR). Taking effect in May 2018, GDPR is managing to elevate cyber risks to the top of the corporate agenda […]

Small mistakes, big data breaches

Keyboard Data

We all make mistakes, especially simple mistakes, such as a typo here and there in email or grammatical oversights in a report. And who hasn’t called or texted a wrong number?  Just this morning I tried to submit a web form, and it was rejected because I didn’t format a field input properly. These types […]

A big — and worrisome — disconnect in enterprise IT security

Enterprise IT security CSC Blogs

When it comes to keeping enterprise systems and data secure, application security takes top billing. No matter how tight and snug an enterprise keeps security controls, an attacker need only exploit a vulnerability in an app to slither on in and grab a foothold. This is why application security and configuration management form such an important baseline to avoid attacks. Good application […]

Criminal attacks continue to ail healthcare organizations

healthcare data breach CSC Blogs

When it comes to healthcare data breaches, the healthcare industry still hasn’t found a cure. According to the Sixth Annual Benchmark Study on Privacy & Security of Healthcare Data, conducted by the Ponemon Institute on behalf of information security firm ID Experts, the majority of healthcare companies surveyed have experienced multiple data breaches. The study […]