When Prevention Isn’t Enough: Security Best Practices for During and After a Breach

Cybersecurity threats pose challenges to organizations of all sizes, across every industry. Cyberattackers, phishing attempts, network eavesdropping, malware and many other threats jeopardize the confidentiality, integrity and availability of IT resources on a daily basis. IT leaders must clearly understand these threats and develop security controls that allow them to remain vigilant as these threats evolve in sophistication and targeting.

Read the source article at biztechmagazine.com
http://retailnetworksecuritysolutions.files.wordpress.com/2017/03/curata__rctvmjmnvfu1ygk.jpeg

4 Key Threats to Information Security this Year

Information security threats in 2017 will be more persistent and damaging than ever before. You need to be prepared for the unknown. This year could see an exponential rise in information security breaches that endanger the integrity and reputation of trusted organisations.

Read the source article at Tailored IT Services Brisbane
http://retailnetworksecuritysolutions.files.wordpress.com/2017/03/curata__lnyvwjouakkjgr6.jpeg

3 Ways to Improve Your Firm’s Cybersecurity – Read on…

Cybersecurity should be one of the biggest concerns for small businesses, but many ignore its importance. They think because they’re small and have very few customers that they’re not a target for hacks and online crimes. However, research presented by Small Biz Trends indicates that about 43 percent of all cyber attacks are aimed at small businesses, and 60 percent of businesses hit will go out of business within six months of the attack.

Read the source article at techprevue.com
http://retailnetworksecuritysolutions.files.wordpress.com/2017/03/curata__pnkfwtg9xplyhk6.jpeg

How Security Awareness Training Can Protect Small Businesses

Small businesses are progressively utilizing information technology in business processes, but aren’t doing it securely. In essence, they do not believe adversaries will target them when there several other big, profitable organizations to attack. As a result, they neglect important measures like security awareness training, which leaves their firm in the crosshairs of cyber criminals.

Read the source article at InfoSec Resources
http://retailnetworksecuritysolutions.files.wordpress.com/2017/03/curata__j12lf5gxjgghrp6.jpeg

4 information security threats that will dominate 2017

As with previous years, 2016 saw no shortage of data breaches. Looking ahead to 2017, the Information Security Forum (ISF), a global, independent information security body that focuses on cyber security and information risk management, forecasts businesses will face four key global security threats in 2017. “2016 certainly lived up to expectations,” says Steve Durbin, managing director of the ISF. “We saw all sorts of breaches that just seemed to get bigger and bigger.

Read the source article at CIO.com
http://retailnetworksecuritysolutions.files.wordpress.com/2017/03/curata__142y6bltwl3wqye.jpeg

5 Cybersecurity Tools Your Company Should Have

No business, small or large, can afford to ignore cyber security. According to a recent Verizon Data Breach Investigations Report, 60 percent of cyber-attacks target SMBs, largely because they are easier targets. Related: 4 Reasons You Need Developers With Cybersecurity Skills in All Tech Teams But you don’t have to be passive. Here are five tools and services which small and medium business can use to protect themselves.

Read the source article at Entrepreneur
http://retailnetworksecuritysolutions.files.wordpress.com/2017/03/curata__6k3rpuq5ccnjesi.jpeg

Managed Security, The Answer To Growing Cyber Threats

With the nature of cyber attacks becoming more sophisticated and complex, it’s quite difficult for organizations to keep a close watch on the activities of the cybercriminals and update themselves at the pace of hackers and disruptors. Considering the several limitations, enterprises today intend to completely outsource the security to the third party managed service providers and free themselves from the headache of designing security architecture and framing security policies.

Read the source article at cxotoday.com
http://retailnetworksecuritysolutions.files.wordpress.com/2017/03/curata__19gsqiratls4wh7.jpeg

Cox BusinessVoice: The 5 Cybersecurity Questions Every Business Leader Should Be Asking

Think cybersecurity isn’t an issue for your business? Think again. Every company, no matter how large or small, offers potential hackers a wealth of data and assets to steal. Here are five questions about cybersecurity you should ask today to help protect your company’s data, assets, and network. Your cybersecurity suite should include basic firewall and identity protection; constant monitoring of your system for problems; anti-malware, -virus, and -spyware solutions; automatic patches.

Read the source article at Forbes Welcome
http://retailnetworksecuritysolutions.files.wordpress.com/2017/03/curata__eyn1njmrsiupepo.jpeg

The Best Tools to Improve Your Company’s Security – Research Blog

Anyone can get hacked. Individuals, brands, Fortune 500 companies, startups… hackers don’t discriminate. It doesn’t matter who you are either. Whether you’re an entrepreneur just starting out, an IT manager, an established business owner, a CIO, a director of security, a CTO, or something in between, you have to be concerned about the digital security of your company. It’s paramount in 2017. You need only look at the number of high-profile hacks and data leaks to understand why.

Read the source article at indusface.com
http://retailnetworksecuritysolutions.files.wordpress.com/2017/03/curata__9xyahjtbbixrxtq.png

What Cyber Security Risk Concerns You Most?

When it comes to effective cyber security risk management, knowing what can hurt your organization is key. In today’s world of complex threats, most organizations have made great efforts to protect customer data and business information. However, many executives my find themselves making complicated decisions that trade-off between managing risk and keeping up with business demands.

Read the source article at CompliancePoint
http://retailnetworksecuritysolutions.files.wordpress.com/2017/03/curata__xjiphybrd7dtkht.jpeg

Does the Internet of Things lead to the Hack of All Things? | IT Business Blog

Knowing a bit about technology, passwords and security, I assumed my electronic devices are pretty safe from hacking. After attending the Conference Board of Canada’s conference on cyber security last week, I’m no longer sure. There were a number of interesting insights shared, such as the data in your car is worth three times the value of the car.

Read the source article at IT Business Canada
http://retailnetworksecuritysolutions.files.wordpress.com/2017/03/curata__nmfkkq42idxzhgu.jpeg

The Sweet Spot between ‘Compliant’ and ‘Secure’

Proofpoint recently joined a group of security leaders at the World Cybersecurity Congress in London, UK. The main topic of conversation? Regulation. Security and IT professionals are increasingly concerned that the recent uptick in compliance requirements, such as the EU General Data Protection Regulation (EU GDPR), could negatively affect security programs. But complying with regulations and implementing cybersecurity best practices don’t have to be at odds.

Read the source article at proofpoint.com
http://retailnetworksecuritysolutions.files.wordpress.com/2017/03/curata__qww7bla9rwpimo0.jpeg

5 Cyber Security Measures Every Startup Must Take

Cyber criminals find small businesses and startups more appealing because they are more vulnerable and prone to a security breach. Generally, they do not have the appropriate security tools, methods and security protocols in place like other bigger companies. In 2017, the number of data breach incidents reported in the U.S. are up over 700% more than the numbers recorded in 2005.

Read the source article at Fortify Experts
http://retailnetworksecuritysolutions.files.wordpress.com/2017/03/curata__ahc7aqqccvuipf8.jpeg

Cybersecurity: 5 basic lessons for everyone

Recently we’ve had the opportunity  – quite a fun and interesting opportunity – to visit a number of information security and cybersecurity conferences. These conferences were flooded with relatively ‘new’ developments such as NextGen, the Internet of Things (IoT), IoT DDoS attacks, security intelligence platform, etc.

Read the source article at WeLiveSecurity
http://retailnetworksecuritysolutions.files.wordpress.com/2017/03/curata__bkizzr9s7x6cuyh.jpeg

CyberUK 2017: Internet of Things poses a threat to businesses

UK security leaders have called for tough action to tackle the rising threats posed by the Internet of Things through increased security on connected devices. The calls come as the recently launched National Cyber Security Centre (NCSC) hosted its first annual CyberUK conference and unveiled research warning that hackers are targeting wearable devices, voice-activated gadgets and the Internet of Things (IoT).

Read the source article at The Commentator
http://retailnetworksecuritysolutions.files.wordpress.com/2017/03/curata__pdvjcsmyudnyo2k.png

Countering the dismal state of security in the Internet of Things

Security has been a huge concern with Internet of Things devices, with connected devices turning up in botnets and having rather concerning security vulnerabilities. Terry Dunlap, founder and CEO of Tactical Network Solutions, helps businesses and developers ensure their systems are built securely. He was kind enough to share some of his thoughts and advice for securing the IoT. Right now, Terry defines security in the IoT as “dismal”.

Read the source article at Dev Diner
http://retailnetworksecuritysolutions.files.wordpress.com/2017/03/curata__6j85jvprpzjy38s.jpeg

3 overlooked endpoints for cyber attacks and how to protect them

You probably think you have endpoint security covered. After all, organizations have been securing end-user desktop and laptop computers for decades with anti-virus software and other cyber security programs. Because of these steps, you think you’re not at risk of an endpoint-initiated attack. However, NTT Security’s 2015 Global Threat Intelligence Report found that 70 percent of the top vulnerabilities reside within user systems, making the endpoint the most common starting point for breaches.

Read the source article at blog.trendmicro.com
http://retailnetworksecuritysolutions.files.wordpress.com/2017/03/curata__rrfsy33ibd04urv.jpeg

Hackers’ delight: Businesses put selves at risk for invasion

NEW YORK — Randell Heath isn’t sure how hackers got into his company’s website — all he knows is a supplier called, saying the site had become an online store selling Viagra and Cialis.

The problem might have been at the company that hosts the site. It might have been that Heath’s passwords weren’t strong enough.

Read the source article at StarTribune.com
http://retailnetworksecuritysolutions.files.wordpress.com/2017/03/curata__vvq19m4pjudibyg.png

Cybersecurity vs. Network Security vs. Information Security

We are in a time where businesses are more digitally advanced than ever, and as technology improves, organizations’ security postures must be enhanced as well. Failure to do so could result in a costly data breach, as we’ve seen happen with many businesses. Threat actors are going after any type of organization, so in order to protect your business’s data, money and reputation, it is critical that you invest in an advanced security system.

Read the source article at secureworks.com
http://retailnetworksecuritysolutions.files.wordpress.com/2017/03/curata__3lbaeqxnravgdda.jpeg

Detection and Response is Top Security Priority for Organizations in 2017

Research firm Gartner today released a report titled “Market Insight: Security Market Transformation Disrupted by the Emergence of Smart, Pervasive and Efficient Security.” The report focuses on the shift in security spending from a prevention-only approach to enhanced detection and response capabilities. This is expected to be a key priority for security buyers over the next five years, and will have a negative impact on budgets for traditional preventive solutions.

Read the source article at Secbi
None

Is Your Company Actually Secure? 6 Security Risks You Might Not Know About

Businesses have always struggled with the idea of business security. Are you doing enough to protect your company, clients, and employees? Is there really such a thing as too much security? Technology is constantly changing, and as such, so are the threats many businesses face. Everywhere you turn, some security company is trying to point out flaws in your security practices and scare you into purchasing additional services that you might not need.

Read the source article at tripwire.com
http://retailnetworksecuritysolutions.files.wordpress.com/2017/03/curata__olnlwelq9pinkeq.jpeg

A weak information security culture means your organization is vulnerable

Organizations normally understand that employees are key to improving information security, but often focus on awareness of policies and procedures. Chantelle van Wyk explains why this approach is ineffective and looks at what else organizations should be doing to strengthen the information security culture. With the marked increase in cyber attacks and ever tighter legislation around data privacy it’s imperative that organizations prioritise security activities and interventions.

Read the source article at Continuity Central
None

This Year’s Top IT Security Trends in the Workplace

On the heels of one of the most vulnerable and insecure years in the cyber world, IT security will not be taken lightly in 2017. We’ve seen victims from the everyday consumer to corporate giants. As the cloud and Internet of Things (IoT)  transform the way we live and work, the security risks surrounding them change as well. This year, and in the coming years, cyber security will become an increasingly more significant priority for companies who want to be sure their data is safe.

Read the source article at Talent 101
http://retailnetworksecuritysolutions.files.wordpress.com/2017/03/curata__arlxqyhxrjnoryk.jpeg

What does being secure really mean?

Security and particularly cybersecurity has repeatedly reached the headlines in recent months. It has widely been acknowledged that there is an ongoing cybersecurity skills challenge which makes recruiting and retaining skilled professionals increasingly difficult, and in part, might be attributed to weaker security for some organisations. However, looking at cybersecurity more broadly, a fundamental question is – what does being secure really mean?

Read the source article at NTT Security
http://retailnetworksecuritysolutions.files.wordpress.com/2017/03/curata__qx84yenmk5mkxyv.jpeg

Cybersecurity Tips for Small Business: What You Need to Know

By definition, cybersecurity is the action taken to protect computer-based systems from attack or unauthorized access. Many think cybersecurity is a problem that only plagues large corporations. We frequently hear about data breaches of big corporations and government entities such as Target, Wendy’s, the U.S. Department of Justice, and the Internal Revenue Service. But what about small businesses? They are small enough to fly under the radar of cybercriminals, right?

Read the source article at Small Business Insights and Ideas
http://retailnetworksecuritysolutions.files.wordpress.com/2017/03/curata__qwuvm7txqn0y1aq.jpeg

Ransomware “Your Money, or your Data!”

Let’s stop the security merry-go-round for a moment and imagine headline-grabbing ransomware as legendary highwayman Dick Turpin. Dick stops us in our tracks on the (information super-) highway and shouts “Stand and deliver! Your money or your data!” In 18th century England, there was no guarantee that even if you did hand over your money and jewels that you would actually escape unscathed, and we’re experiencing the same today with ransomware.

Read the source article at Infosecurity Magazine
http://retailnetworksecuritysolutions.files.wordpress.com/2017/03/curata__sgpwcrkukbpj7g6.jpeg

How To Combat The Rising Ransomware Epidemic

Ransomware is on the rise, with cybercriminals regularly developing new variants of the malware, targeting more businesses, and demanding larger payments to “restore” user data. With the emergence of ransomware-as-a-service (RaaS), even criminals with minimal technical skill can launch devastating attacks against businesses and organizations. According to the FBI, Ransomware payments have dramatically increased to around $1 billion in 2016, compared to just $24 million in 2015.

Read the source article at Louis Kohman
http://retailnetworksecuritysolutions.files.wordpress.com/2017/03/curata__ughryjr5eqpbf6m.jpeg

3 Types of Security Training Employees Need Annually

Your company’s cyber security procedures must be reinforced periodically to stay effective. Your staff will slowly fall out of the appropriate practices throughout the year and will need gentle reminders and training to get back on track. Also, IT security threats change over time, so your staff will need to be updated on new threats and procedures. There are several key areas where you should focus your company’s training efforts. Here are the types of security training employees need annually.

Read the source article at Private Tunnel
http://retailnetworksecuritysolutions.files.wordpress.com/2017/03/curata__ipba34lmqff7ynw.png

Why ‘Data Hoarding’ Increases Cybersecurity Risk »

The proliferation of data and constant growth of content saved on premise, in cloud storage, or a non-integrated solution, poses a challenge to businesses, in terms of both compliance and security. This is not helped by the estimation that 80% of content most businesses have is unstructured. A general lack of understanding of how to manage the data and a reluctance to delete content, leads to ‘data hoarding’ and businesses seem unaware of what data is present and what value it holds.

Read the source article at cloudtweaks.com
http://retailnetworksecuritysolutions.files.wordpress.com/2017/03/curata__2ie4ttle49g1jqh.jpeg

Security—It’s Not Just an IT Problem. It’s a Business Problem. | Citrix Blogs

Over the past few years, multiple studies have shown that information security risk is one of the top two or three concerns of every organization’s board of directors. CSOs are spending more time in front of their boards educating them on information security risks faced by the business, and helping them to understand how they can mitigate those risks.

Read the source article at citrix.com
http://retailnetworksecuritysolutions.files.wordpress.com/2017/03/curata__slsnwpfemk9upqy.png

Protecting Your Company From Ransomware and Restoring Data After a Breach

The data center is like a castle. You can pull up the drawbridge, fill up the moat or pull down the portcullis. But at some point you must let data in and out, and doing so creates the opportunity for ransomware attacks. No longer is it just a matter of pride and peer recognition among hackers to circumnavigate and expose the security of an organization; it’s now a full-fledged industry thanks to ransomware. Cybersecurity company Herjavec Group estimates it will top $1 billion in 2016.

Read the source article at Data Center Magazine
http://retailnetworksecuritysolutions.files.wordpress.com/2017/03/curata__n9tcidldqt6lr8k.jpeg

Is Your Business Taking Security Seriously? 5 Checks To Make

There’s no point having your cyber security up to date if your physical security doesn’t match it; you still need to take the threat of a break in very seriously because an easy-steal is hard to resist for criminals, and the costs of recovering everything (if you can at all) are huge. Here are five top tips to make sure your business security is the best it can be.

Is everyone aware of the policies?

Read the source article at Business Matters
http://retailnetworksecuritysolutions.files.wordpress.com/2017/03/curata__gmvqqng1f0y2hej.jpeg

How to lock down your security system

As long as data is online there will always be concerns over cyber security. There are many steps a business can take to help better protect their physical security systems from cyber threats. From simple things like not using default or simple passwords, to more advanced steps like using PKI certificates and making sure you download the latest firmware – each are important to keeping your data, and your network, secure.

Read the source article at Welcome to Network World.com
http://retailnetworksecuritysolutions.files.wordpress.com/2017/03/curata__qc0xhsoodbou3dx.jpeg

Security basics: 9 ways to make IoT devices more secure

Devices must be more secure if IoT is to reach its full potential. The good news is that security policies and procedures can protect enterprise infrastructure, harden IoT configurations, and make the network smarter and more defensible. Here’s where to start. New devices are being plugged into the Internet of Things (IoT) at a rapid pace. While IoT is expected to offer many benefits, adding insecure devices to an enterprise network can have serious consequences.

Read the source article at Welcome to Enterprise.nxt
http://retailnetworksecuritysolutions.files.wordpress.com/2017/03/curata__04smv65st6tjaat.jpeg

How to patch your security blind spots

One of the most challenging – and interesting, and frustrating – aspects of cybersecurity is the sheer unpredictability of industry developments still to come. Sure, analyzing recent history, preparation strategies and common mistakes can offer some direction forward in the security space. However, when a major event takes place, its size and depth usually has something to do with the fact that too few people saw it coming.

Read the source article at Help Net Security
http://retailnetworksecuritysolutions.files.wordpress.com/2017/03/curata__hjca9qpn9ksphwc.jpeg

Your Business Has Been Hacked: What to Do First

Preparation not only prevents breaches, but also minimizes the impact of a breach on your business operations. Here’s what to do if you’re in the midst of a breach. Experts say it’s no longer a question of if you will be hacked, but of when you will be hacked—and how quickly you can recover to resume operations makes all the difference. After the initial shock, you must act to minimize the effects of a data breach.

Read the source article at OnRamp Data Centers
http://retailnetworksecuritysolutions.files.wordpress.com/2017/03/curata__1izdbtjbtvo9edv.jpeg

Cybersecurity for Everyone: Securing your home or small business network – CyberWar: Si Vis Pacem, Para BellumCyberWar

Specifically for home users and small business owners, cybersecurity expert Terry Sadler lays out the easy-to-learn methods and tips that will make using the Internet more safe and secure and protect the family as well as the business.Identity Theft. According to the Symantec Internet Security Report (2014), mega breaches are data breaches that result in at least 10 million identities exposed in an individual incident.

Read the source article at Cyberwar
http://retailnetworksecuritysolutions.files.wordpress.com/2017/03/curata__ollusggprxvkjsc.jpeg

WordPress Security 101: How to secure your website against hackers – CyberWar: Si Vis Pacem, Para BellumCyberWar

WordPress is great for managing your website, but it’s often targeted by hackers. If you want to keep your site secure or deal with a hack after it’s happened, Brecht Ryckaert has your back. This security guide will show you just how to batter down the hatches of your WordPress website. You’ll learn how to counter Brute Forcing attacks, HTTP trace attacks, script injections, XML-RPC attacks and so much more.

Read the source article at Cyberwar
http://retailnetworksecuritysolutions.files.wordpress.com/2017/03/curata__eipuyexnfyzdljp.jpeg

Almost All Security Professionals Fear an Increase in Attacks on Industrial IoT

As nice as it is to have a connected world, the security threats brought on by the desire to have every device we own connected to the Internet are great. In fact, a staggering 96% of IT security professionals expect an increase in attacks on industrial Internet of Things.

Read the source article at Latest News & Reviews by Softpedia
http://retailnetworksecuritysolutions.files.wordpress.com/2017/03/curata__uhdfqcixsizoiou.jpeg

RoT: Ransomware of Things

Major security breaches have hit headlines the past year, their severity ranging from infecting a few hundred to a few million users. We have seen much variety, like holding sensitive data hostage for ransom, DDoS attacks, and various exploitations of IoT devices. Sadly, this trend will continue to rise if security remains a secondary concern. ESET researchers predict the next step in the evolution of malware could be a cross between the known approaches.

Read the source article at Malc0de
http://retailnetworksecuritysolutions.files.wordpress.com/2017/03/curata__wmxr8rvcvgl4lei.jpeg

Are cyber criminals targeting your industry? – Hiscox Business Blog

Cybercrime is the fast-growing economic crime in the UK, and is expected to get even bigger in the next couple of years, according to PwC’s Global Economic Crime Survey 2016. The steep increase in cyber attacks is because more firms are using the cloud to store their data and the increasing interconnectedness of networks and gadgets brought about by the ‘internet of things’.

Read the source article at Hiscox UK
http://retailnetworksecuritysolutions.files.wordpress.com/2017/03/curata__869tozpu9fdwhgh.jpeg

Cybersecurity pros say more industrial IoT cyberattacks expected

The results of a recent survey querying IT security pros about the threats posed by devices tethered to the internet were practically unanimous: 96 percent of them said they expect to see an increase in security attacks on IoT. While the study by Tripwire recognized the enormous promise of these devices in facilitating tasks and bringing convenience, ultimately simplifying life for millions, IoT devices also hold a risk as they are not always built with security in mind.

Read the source article at Cybersecurity News and Product Reviews
http://retailnetworksecuritysolutions.files.wordpress.com/2017/03/curata__prymrjgpcs8y59w.jpeg

10 Steps to Cyber Security – Amshire

Cyber-attacks continue on a daily basis, and the scale and rate of these attacks shows little sign of abating as born out in the latest Cyber Security survey see Cyber Security – How Business are Faring THE 10 CYBER SECURITY STEPS guidance is for businesses looking to protect themselves in cyberspace. Originally published in 2012 and now used by around two thirds of the FTSE350, the guidance remains the same and is reproduced below.

Read the source article at amshire.co.uk
http://retailnetworksecuritysolutions.files.wordpress.com/2017/03/curata__pe5r0ica6h4snva.jpeg

Why third-party risk is worth the reward

We’ve heard the fateful story of the Target hackers breaking into company systems using network credentials taken from its refrigeration and HVAC provider. In the worst-case-scenario story, a network security shortcoming was compromised from seemingly one of the unlikeliest of places. The major data breach served as a glaring example of third-party vulnerabilities and the risk they can introduce to an enterprise.

Read the source article at ciodive.com
http://retailnetworksecuritysolutions.files.wordpress.com/2017/03/curata__5bavniyd1dxq2xd.jpeg

Nine Security Tips That Go Outside the Box

The great challenge of security is that you are not only battling Murphy’s Law — the universal tendency of things to go wrong — but also shrewd and malicious attackers who are looking for an edge. Rather than constantly changing strategies to match these evolving threats, many security pros could benefit from finding a few simple methods that can stand the test of time and help prevent a breach.

Read the source article at Security Intelligence
http://retailnetworksecuritysolutions.files.wordpress.com/2017/03/curata__nqod7irl2tl7uzt.jpeg

Advanced Threat Protection: Expert Tips for Protecting Your Organization Against Advanced Threats

Advanced threats have become a serious problem for today’s enterprises. Often a moving target, advanced threats are among the most challenging security threats for companies to mitigate, requiring a multi-faceted approach that identifies threats and successfully blocks them before compromise or data loss occurs.

Read the source article at Data Loss Prevention Software
http://retailnetworksecuritysolutions.files.wordpress.com/2017/03/curata__gdnqnp0n8rxdxih.jpeg

How bad endpoint security can leave IT pros flying blind

Businesses with dispersed and on-the-move employees are struggling to strike a difficult balance between the benefits of remote working and the security risks it creates. Security software designed to protect data at risk is nullified if it can be removed. To achieve their own stringent security aims while satisfying the demands of increasingly tight and punitive regulation, companies need a more persistent security solution.

Read the source article at ITProPortal
http://retailnetworksecuritysolutions.files.wordpress.com/2017/03/curata__muwcrxecsfaghca.jpeg

Slow and steady will not win the cybersecurity race

Agile security is essential to any business, but the opinions over how (and when) security should be integrated into the DevOps cycle vary greatly. While we always recommend that you bake security into your plans from the start, there are often barriers to doing so depending on a company’s use of the cloud and cohesion between Dev and Ops teams.

Read the source article at The CloudPassage Blog
http://retailanditconsulting.com/wp-content/uploads/2017/03/curata__0qzubzrbmhhitba.jpeg

CenturyLink: Changing the Security Mindset

Businesses need to stop thinking of cybersecurity as an IT function and think of it as an ongoing activity such as accounting, the head of CenturyLink’s security services says.

In an interview with Light Reading the day after he’d hosted a CenturyLink Inc. (NYSE: CTL) Cybersecurity Summit in Monroe, La., Bill Bradley, the SVP of cyber engineering and technology services, admits he and others in the field are frustrated by the continuing need to get businesses to update their security efforts and take them more seriously. Given the way data breaches dominate the headlines, it’s hard to …

Read the source article at Light Reading
http://retailanditconsulting.com/wp-content/uploads/2017/03/curata__ytjk7hgudd2uefu.jpeg

The power of knowledge in the fight against cyber security

In the face of the challenges cyber security poses to our everyday lives, how can businesses ensure that they have the knowledge to protect themselves online? Not a day goes by without a news story on the topic of cyber security. It’s a subject which dominates digital forums frequented by IT professionals and the national media, rousing concern from the general public about how safe the digital landscape is and who has access to our personal information.

Read the source article at ITProPortal
http://retailanditconsulting.com/wp-content/uploads/2017/03/curata__cinil6kd7hwi7sw.jpeg

Nearly two-thirds of polled organizations hit by ransomware, CyberEdge report

Sixty-one percent of organizations polled in a new survey responded that they’d been hit by a ransomware demand. But, perhaps more troubling was the finding that of those, a third paid the ransom demand. This was but one of the findings in CyberEdge Group’s “2017 Cyberthreat Defense Report,” [PDF, registration required] the research and marketing firm’s fourth-annual look at the top cyberthreats facing organizations – and what IT security personnel are doing to defend against them.

Read the source article at Cybersecurity News and Product Reviews
http://retailanditconsulting.com/wp-content/uploads/2017/03/curata__p8skt9qv8phlmn5.jpeg

7 cybersecurity issues small businesses need to understand in 2017

Security breaches and cybercrime incidents hit the headlines in 2016, as high-profile news of data breaches, malware, DDoS attacks and compromised systems became mainstream news. The news reports inevitably focused on cyber-attacks on major corporations, such as the data thefts from TalkTalk, Three and Tesco Bank, as well as the extraordinary autumn story of the attack on Dyn, which made use of IoT-enabled household devices, such as fridges and toasters, to form a botnet that successfully brought down an enormous number of websites, both large and small. Whilst the past year was eventful, to say the least, in terms of …

Read the source article at bytestart.co.uk
http://retailanditconsulting.com/wp-content/uploads/2017/03/curata__dumlrfbj3jrl8sn.jpeg

Six ways to defend against digital threats

The digitisation of manufacturing, or Industry 4.0 as it is commonly known, is driving industrial operators to achieve new levels of productivity, quality, and visibility. It doesn’t take the genius of early industrial innovators like Robert Louis Stephenson to see that manufacturers who connect their factory systems with their enterprise networks will create a more agile, efficient, flexible and profitable business.

Read the source article at themanufacturer.com
http://retailanditconsulting.com/wp-content/uploads/2017/03/curata__p6fgikucvabnubp.jpeg

One-third of ransomware victims pay associated ransoms

61% of organizations were compromised by ransomware in 2016, while the percentage of organizations affected by successful cyber attacks reached an all-time high, according to a study conducted by CyberEdge Group. The report also found that one in five respondents indicated dissatisfaction with Microsoft’s available protections for securing Office 365 deployments, opening the door for third-party security solutions.

Read the source article at Home – Resilience Today
http://retailanditconsulting.com/wp-content/uploads/2017/03/curata__nve9luooa0zkj9y.jpeg

Gartner Says Detection and Response is Top Security Priority for Organizations in 2017

Enterprises are transforming their security spending strategy in 2017, moving away from prevention-only approaches to focus more on detection and response, according to Gartner, Inc. Worldwide spending on information security is expected to reach $90 billion in 2017, an increase of 7.6 percent over 2016, and to top $113 billion by 2020. Spending on enhancing detection and response capabilities is expected to be a key priority for security buyers through 2020.

Read the source article at Technology Research
http://retailanditconsulting.com/wp-content/uploads/2017/03/curata__izfd1s0a5dbntaw.jpeg

The Business Imperative for Strong Cyber Security

There are more reasons to invest in cyber security than you might initially think. Of course, it keeps a business’s IP and finances secure and protects staff personal information. For those organizations dealing with customer information, it keeps that data secure as well, which protects their continued custom. But on top of all those well-known reasons, there is perhaps one that is not considered enough – the additional business opportunities it opens.

Read the source article at Global Data Sentinel
http://retailanditconsulting.com/wp-content/uploads/2017/03/curata__ywc5cqpv3a6nvnm.jpeg

Four Security Priorities for 2017

Posted by C Henry on Wed, Mar 1st, 2017 The way in which we approach technology within our organizations changes from year to year as does, and so should our security priorities. Yearly shifts in our security practices are attributed to both new technologies as well as new tactics implemented by cybercriminals. Below are four security priorities that every IT team needs to address for the coming year.

Read the source article at titanhq.com
None

Top Cyber Security Issues for 2017 from Leidos Outlook & Trends

They say the quality of our thinking is often a function of the quality of the questions we ask. In this regard we can get some great improvements in our thinking based on the Leidos 2017 Cybersecurity Forecast. Titled “Security Trends and Predictions: 2017 Demands a New Approach,” the Leidos report includes input from Forrester Senior Analyst, Joseph Blankenship, who provided responses to five FAQs based on his presentation of security trends and predictions for 2017.

Read the source article at T&D World
http://retailanditconsulting.com/wp-content/uploads/2017/03/curata__9iqqjveblmp3esh.jpeg

Most hackers can steal data within 24 hours, study shows

More than eight in 10 hackers can break through cyber security defences, access IT systems they target and steal data within 12 hours, a study has revealed. However, the breach may not be discovered for hundreds of days, according to the study by global technology company Nuix. The Nuix Black Report is based on a survey of 70 professional hackers and penetration testers at Defcon, the world’s largest hacking and security conference.

Read the source article at computerweekly.com
http://retailanditconsulting.com/wp-content/uploads/2017/03/curata__7cgztrzthycmaos.png

Securing the Internet of Things

Internet of Things security. First and foremost, the industry has to overcome its tendency to place adoption ahead of security. Campaigns have to be run to raise awareness that IoT devices need to be secured. Plug-and-play, default settings, and wide-open devices are not conducive to a secure environment — yet they represent the bulk of current IoT products and services.

Read the source article at eSecurity Planet
http://retailanditconsulting.com/wp-content/uploads/2017/03/curata__vlaianjns33lchq.png

Connecting Everything to the Internet: What Could Go Wrong?

If the Internet of Things (IoT) industry is the Jedi order, with Philips Hue lightsabers and “smart” cloud-based Force powers, then popular Twitter account Internet of Shit is a Sith Lord. At a time when the technology industry seems eager to put a chip in everything, consequences be damned, Internet of Shit puts a name to the problem of new, useless electronics and highlights that some of these products may not be as benign as we think.

Read the source article at pcmag.com
None

8 Ways to Prevent a Security or Data Breach

Here are some security tips all small businesses should heed and implement to protect their customers — and business.

You may not think your small business is large enough to attract the attention of virtual thieves and cybercriminals, but any business that processes customer payment information is a potential victim of a security or data breach.

Here are some security tips all small businesses should heed and implement to protect their customers and business:

Read the source article at Business.com
None

3 Easy Tips to Save Your Employees a Big Cybersecurity Headache

While organizations need to focus on network security monitoring and sophisticated security tools to defend their IT assets, individuals can also take their own steps to beef up digital defenses. Improvements to ordinary users’ endpoint security don’t just benefit employees at home—the improvements help cybersecurity at the office, too, when workers bring personal devices to use on company networks.

Read the source article at EiQ Networks Blog
http://retailanditconsulting.com/wp-content/uploads/2017/03/curata__cxljh8kiupyssnc.jpeg

The Case for Securing IoT

With the advent of the Internet of Things into the mainstream technology hallways, cyber-attacks on IoT devices too are increasing. The past year saw a host of Distributed-Denial-of-Services (DDoS) attacks on popular sites such as Netflix and Twitter and the rise of the Mirai botnet as a potent threat. Looking at the current security ecosystem, it is high time that IoT-makers take on the challenge to make their devices and networks secure.

Read the source article at ReadITQuik
http://retailanditconsulting.com/wp-content/uploads/2017/03/curata__baxef0pezljsyki.jpeg

According to Hackers, Windows 10 Security Passes the Test

Windows is perhaps the most common workplace computing tool, and hackers have been trying for decades to uncover holes in its security. In some cases, like with unsupported operating systems, they’ve succeeded. However, Microsoft’s latest addition to their OS family, Windows 10, seems to have exceptionally potent built-in security measures, many of which have the hackers at the Black Hat conference scratching their heads and scrambling to find threats to talk about.

Read the source article at Managed IT Services & IT Support
http://retailanditconsulting.com/wp-content/uploads/2017/03/curata__ymnigbx5nchapoc.jpeg

Security and Compliance – A Relentless Battle – ISACA Now

The overall objective for security controls is to support the organization’s services and infrastructure by identifying risks, improving the security level, and enabling rapid detection and response to security attacks. It is also true that, in practice, no organization can place all the security controls against every cyberattack by itself. Consequently, it is now a growing practice that many organizations leverage a hybrid model for their security controls.

Read the source article at Information Technology
http://retailanditconsulting.com/wp-content/uploads/2017/03/curata__du4xanoiizdtzeg.jpeg

Is Your Business Taking Cyber Security Seriously? – BubbleIT

In previous decades, cyber security was unheard of. But in today’s world of modern business, we have to deal with a huge variety of potential issues and security threats. In the past, business would be conducted exclusively using paper and written documentation. Security would involve physical building security and the correct storage and protection of archived data.

Read the source article at Managed IT Support Nottingham
http://retailanditconsulting.com/wp-content/uploads/2017/03/curata__amcu0qudaa1ktuc.jpeg

Consumer Reports To Consider Cyber Security In Product Reviews

A recent announcement from Consumer Reports, an influential US group that conducts extensive product reviews, suggests that they are gearing up to start considering cyber security and privacy safeguards when scoring products. IT security experts from LogMeIn and Allot Communications commented below.

Ryan Lester, Director Of IoT Strategy at Xively by

Read the source article at home – Information Security Buzz
http://retailanditconsulting.com/wp-content/uploads/2017/03/curata__thoggouzz7vkzkb.jpeg

Are companies doing enough on the IoT security front? | Networks Asia | Asia’s Source for Enterprise Network Knowledge

We continue to hear dire warnings about the inherent security risks of the Internet of Things (IoT), and indeed IoT-related incidents are happening. With many companies beginning to capture IoT data from connected devices, a key question is are they doing enough to ensure that data and networks are secure?

Read the source article at Networks Asia
http://retailanditconsulting.com/wp-content/uploads/2017/03/curata__p6ozgdrqhrwkjad.jpeg

10 Important Cyber Security Tips For Small Business Owners

Small businesses are generally not well secured due to being labeled as small businesses, but their security threats are not necessarily small. On any given day, they can fell to the hacking, malware, ransomware and data breaches due to their cheap and dated protection. But with the few steps, you can avoid such cyber security risks. If you think that your small business is not vulnerable to cybercrimes like big corporations, you need to think again.

Read the source article at home – Information Security Buzz
http://retailanditconsulting.com/wp-content/uploads/2017/03/curata__wjo0x0raa4tapf9.jpeg

The Future of Cybersecurity

You can’t discuss the future of cybersecurity without considering emerging trends in technology and threat landscapes. As organizations develop and adopt technologies related to big data, cognitive computing and the Internet of Things (IoT), cyberthreats are growing in both volume and complexity. The race is on to secure these systems and devices before fraudsters figure out how to exploit them.

Read the source article at Security Intelligence
http://retailanditconsulting.com/wp-content/uploads/2017/03/curata__pjko0rtttjowjiz.jpeg

Why an Effective Security Program Is Crucial For Long-Term Success –

With technology integration only becoming more important to the productivity and daily operations of business, have you thought about the importance of an integrated security program to uphold that vital digital infrastructure? If your company’s security practices are not holistic and account for every vulnerable area of your business, it can affect long-term success.

Read the source article at Foresite
http://retailanditconsulting.com/wp-content/uploads/2017/03/curata__9coq8awtac8jwlx.jpeg

Big Data Security: Progress Is Made, But Is It Enough?

It’s taken a few years and more than a few major data breaches, but it would appear the tide is finally beginning to turn when it comes to awareness of the importance of protecting data stored in analytical and transactional systems alike. But don’t let your guard down yet, as major security threats—such as gaps in the Hadoop security stack, ransomware, and corporate bureaucracy—continue to threaten data sanctity.

Read the source article at Datanami
http://retailanditconsulting.com/wp-content/uploads/2017/03/curata__vnxo00zokokqypy.jpeg

Preparing your organisation for the future: How to manage cyber risk and protect your critical data

2016 has been a record breaking year for cyber attacks. Organisations of all types and sizes have been successfully targeted, from governments and political parties to transnational corporations. For individual companies, a 2016 Ponemon Institute study determined the consolidated total cost of a data breach to be approximately $4 million. Recent regulatory changes promise to make this number grow dramatically.

Read the source article at Business Reporter
http://retailanditconsulting.com/wp-content/uploads/2017/03/curata__wckdwxlnapzg67h.jpeg

How to Protect Your Data from Tax-Time Hackers

Protecting your data is especially important during tax season, when sensitive information about your business and your employees is susceptible to attack by would-be identity thieves. Faux calls and emails from attackers posing as representatives of the IRS or even managers within your organization are commonplace and can lead to the theft of information from unsuspecting employees. Luckily, there are steps you can take to bolster your security during this time of increased vulnerability.

Read the source article at Business News Daily
http://retailanditconsulting.com/wp-content/uploads/2017/03/curata__iwvuz7hii9npxeh.jpeg

Protect Your Business From Catastrophic Data Breaches

A data breach will cost a business $4 million on average, according to a 2016 study from IBM. Large organizations have more to lose; Yahoo’s sale price was reduced by $350 million after being hit by the largest breach in history. US companies are now scrambling to meet the stringent data privacy rules required by the EU General Data Protection Regulation (GDPR) when it is introduced in 2018.

Read the source article at Global Trade Magazine
http://retailanditconsulting.com/wp-content/uploads/2017/03/curata__awhfhhml6eqesct.jpeg

Why Printers Still Pose a Security Threat

Newly discovered security flaws in popular printers remind us how networked devices continue to put users at risk. Networked printers for years have left gaping holes in home and office network security. Today, experts continue to find flaws in popular laser printers, which are putting businesses at risk. Experts at the University Alliance Ruhr recently announced vulnerabilities in laser printers from manufacturers including Dell, HP, Lexmark, Samsung, Brother, and Konica.

Read the source article at Dark Reading
http://retailanditconsulting.com/wp-content/uploads/2017/03/curata__j6en0xarcsvpksk.jpeg

Experts predict 2017’s biggest cybersecurity threats

From internal threats to creative ransomware to the industrial Internet of Things, security experts illuminate business cybersecurity threats likely to materialize in the next year. If 2016 was the year hacking went mainstream, 2017 will be the year hackers innovate, said Adam Meyer, chief security strategist at SurfWatch Labs. Meyer analyzes large and diverse piles of data to help companies identify emerging cyber-threat trends. “2017 will be the year of increasingly creative [hacks],” he said.

Read the source article at techrepublic.com
http://retailnetworksecuritysolutions.files.wordpress.com/2017/03/curata__0ix7zdfjwlent5w.jpeg

PCI Compliance Post #3

The third step to being PCI Compliant is “Protect stored cardholder data.” All card data must be encrypted. Better yet, do not store any credit card data on your point of sales network. Contact us today if you have any questions or would like more information about this! We are passionate about getting companies secure and PCI Compliant. info@retailnss.com

Carla’s Story

This is a very informative video about how much damage a data breach can cause. Carla spent over $120,000 when her restaurant was hit. Contact us today to find out if you’re at risk info@retailnss.com

https://youtu.be/JsfUdY89lJc