Facebook is, without a doubt, the most popular social media platform, boasting that over one billion people are active users. Since they introduced their Facebook Live feature, which allows users to broadcast what they're doing, saying, etc. to their friends, it's soared in popularity. However, unless you have restricted the platform's privacy settings, you could broadcast your life to the entire world without realizing it. In fact, even if you do restrict these settings, you're still at risk. Your live broadcast may be, what you consider to be, completely harmless. But if you broadcast from your home, you open yourself up to being followed in real life and not just in Facebook. It's easy to then extend this to business dangers. If employees are walking around with what is essentially a broadcast satellite truck in their pocket at all times, you need to [...]
For most organizations, this monetary loss can cause tremendous agony and yet, it's only a fragment of the damage felt when experiencing a data breach. You’ve just been attacked and robbed; customers who trust you were violated. But, it’s important to maintain a level head so you can make the right decisions for your organization and consumers. The way you treat and communicate with your customers and key stakeholders during a data breach–or any crisis–can have a resounding, long-lasting effect.
Threats from cybercrime are happening at alarming rates. One new tactic is hitting homes and offices that trick people into believing their computer is in critical danger. When someone attempts to take action on these phony warnings, scammers swoop in and hold the computer ransom until payment information is sent. Sikich Security and Compliance Manager, Kevin Bong, talked with TMJ4 in Milwaukee about the forms this scam takes and what to do if you find yourself in this scenario. […]
Six Steps to a Better Security Strategy by Martin Whitworth | January 22, 2016 Fill Out the Details Below to Access the Full Report. A $500 Value Why Read This Report? Creating and maintaining a security strategy is fundamental for success. Unfortunately, many of today’s strategies fail to connect with the business or create a compelling case for action, which undermines the CISO’s support and credibility. In this report, we provide you with the six steps to create an effective security strategy linked with key business interests and success factors. The State of Cyber Security 82% of Security professionals feel that their board of directors is concerned or very concerned about cyber security 74% Expect [...]
Manufacturing and cybersecurity have a complicated relationship. A lack of adoption of key information security practices continues while cyberattacks within the manufacturing industry are on the rise. With a single data breach, a manufacturer can lose consumer trust and years of proprietary information to competitors. No longer can cybersecurity be viewed only as a simple checklist for compliance requirements. Although it may be impossible to eliminate all risks, understanding and assessing vulnerabilities and implementing a cybersecurity initiative can provide the greatest level of risk reduction. Follow these three steps to implement a cybersecurity initiative in your manufacturing company: Step 1: Focus on the Most Important Aspects of your Business Every industry varies in the type of data that is most important to protect; in healthcare its patient information, in retail its payment card data. However, [...]
The costs related to a security breach can be crippling. The average cost for each lost or stolen record at $201, and the total average 2014 cost paid by organizations at $5.9 million for each data breach - and that doesn't include loss of customers. As a CFO, you play a critical role in establishing a cybersecurity program. While cybersecurity traditionally has been handled by the CIO and the IT function, the escalating risks have driven cybersecurity up the corporate ladder to the desk of the CFO. During this 45-minute webinar, our security experts share: The CFO's role in cybersecurity - today and tomorrow Understanding cyberrisks and the potential impacts of a breach. What is the role of IT in cybersecurity? 6 questions you can ask to gauge where your IT team stands. 2016 security outlook: increased regulations and [...]
2016 Manufacturing Report Key Finding: Manufacturers are Vulnerable to Cyber Threats These days, it is not uncommon to hear about a recent cyber attack. News outlets are reporting cyber attacks more frequently and highlighting the fact that retail, health care and governments are not the only industries vulnerable to data breaches. Attacks against the manufacturing industry continue to rise. The Verizon 2015 Data Breach Investigations Report shows that the contributors to the report reviewed 525 separate incidents within the manufacturing industry segment, up from 251 in 2014. Of these incidents, more than 60 percent were attributed to some form of cyber-espionage. In fact, the Federal Bureau of Investigation (FBI) estimates that hundreds of billions of dollars of U.S.-based intellectual property is leaving the U.S. through computer-based attacks each year. Other Key Findings in the Report Fill Out the Details Below to Access the Full Report Manufacturers are [...]
Generally speaking, there are only a few operational areas within a manufacturing and distribution (M&D) company where employee dishonesty involves the theft of money. These hot spots – cash and payment operations, accounts payable, payroll and purchasing – are key areas of focus in the theft prevention process. They are often short staffed due to tight budgets, and in an effort to save money, management overlooks the real danger of theft that can occur where few employees cover sensitive jobs. The danger is further compounded when one or two trusted employees have administrative access and password control to manipulate the accounting system, as well as control over financial reports. The system and plan to prevent employee dishonesty rests on an effective internal control system, which is uniquely tailored to every business. The following six areas deserve special attention when planning [...]