3 Barriers to Cybersecurity Success and How to Overcome Them

2016 was a record year for data loss with reported breaches exposing almost 4.3 billion records. While the reported number of incidents has not increased year over year, the average breach was more severe – and exposed more records – than in previous years. You only need to look at the number of compromised records at three breaches in 2016 to see examples of the severity: Yahoo, FriendFinder and MySpace.

Read the source article at Home – CenturyLink Bright Ideas

How your company needs to train workers in cybersecurity

With workplace cyberattacks on the rise, industry experts are pressing businesses to train their workers to be more vigilant than ever to protect passwords and sensitive data and to recognize threats. “It is imperative for organizations of all sizes to instill among employees the critical role they play in keeping their workplace safe and secure,” said Michael Kaiser, executive director of the National Cyber Security Alliance, a group that promotes education on the safe and secure use of the internet. The group’s members include such major technology companies as Cisco, Facebook, Google, Intel and Microsoft. Kaiser made his comments …

Read the source article at computerworld.com

Plan, prepare and be secure: a guide to cyber security

These days pretty much all businesses use computers in some way or another. If yours is one of them, then you need to think about cyber security. It’s a term which we’ve all heard about, but which very few of us actually see as a direct risk to ourselves or our businesses. Some people find it very rare to be impacted at all, as their habits or their obscurity keep them safe.

Read the source article at SME Magazine

4 Reasons Why Clouds May Be More Secure Than Your Small Business Computer System

Choosing cloud as the term for a system that stores data may have been an unfortunate misnomer. With regular news stories about hacking, it is difficult to envision a world where data floating around in the sky could ever be secure. In a nutshell, cloud computing refers to services that are delivered over the internet. If involvement by the hacker-prone internet fails to help you sleep at night, then it’s time to learn more about the magic of the cloud.

Read the source article at Microsoft Enterprise

Top 10 data security tips for small business

Every year for USA TODAY, I write an annual top trends in business column to start the year. For the past few years, there has been one issue that has made my Top 5 consistently, and it wasn’t mobile, social media, or technology. Yes, the issue is that big and the stakes are that high.

Read the source article at blogs.business.microsoft.com

Making cyber security your business, and your firm cyber secure

Stephen Franklyn of Lithium Systems discusses why accountancy firms should prioritise cyber security and how they can take steps to protect both data and their reputation. As we now live in a world of information technology, the risk to our business critical data continues to increase at an alarming rate, yet many business have only the vaguest concept of what cyber security is and what it means for them. The harsh reality is that all businesses are faced with threats on a daily basis.

Read the source article at Accountancy Age

The IoT Impact on Businesses

The Internet of Things (IoT), in which all manner of devices and things are connected, is enabling digital transformation in many walks of life. It’s also heralding the promise that we will soon live in hyperefficient smart cities. But how does this affect business? A recent report from The Economist Intelligence Unit (EIU) gauged the current IoT impact on business in comparison to similar research the firm conducted in 2013.

Read the source article at Security Intelligence

How to Protect Yourself and Your Business from Online Criminals

Today’s online criminals have the ability to move faster and more covertly than ever before. They’re out to get you, and they’re exploiting every vulnerability. Whether you’re a business owner or a consumer, here are four ways to protect yourself. Related: 6 Security Measures Every Startup Should Take in 2017 Fraud has moved online. Back in 2015, the U.S. started using EMV microchip cards.

Read the source article at Entrepreneur

UK businesses and cyber security One in five businesses suffered attack in 2016

LONDON, U.K. – In its latest survey, the British Chambers of Commerce (BCC) found just how prone British businesses are to cyber attacks. According to the survey conducted by the body, one in five businesses in the U.K. has been the victim of an attack within the last year. Revealing the findings of the survey, BCC urged organisations in the country to improve their cyber security provisions.

Read the source article at Big News Network.com

Why Adaptive Crimes Are a Threat to Your Business—and Customers | Dealer Marketing

While you’re reading this, adaptive cyber criminals may be targeting your dealership and your customers—to steal your money and their identities. Today’s cyber thieves and hackers seem to remain one step ahead of security systems and theft deterrent tools, but that’s changing. That’s good news for any retailer, including auto dealerships. Cyber crimes are adaptive crimes.

Read the source article at Dealer Marketing

Cybersecurity Essentials to Protect Your Small Business from Hackers

American Small businesses are becoming one of the top targets for global hackers. While a solid deadbolt on the front door and a set of security cameras scoping out the parking lot are still sensible ways to keep your place of business safe and secure, there are a lot more potential security issues lurking in your unassuming laptop or WiFi router than in the physical building itself, and they deserve every business owner’s serious attention.

Read the source article at business2community.com

8 Cyber Security Tips for Small Business

Today, cyber security tips for small businesses should not be taken lightly. If you are like millions of small-business owners in America, you probably cannot imagine how a cyber criminal halfway around the world could possibly cause your business to suffer a data security breach. After all, aren’t hackers busy enough with the Fortune 500? Surprise!

Read the source article at IT Services Philadelphia

Intercontinental Hotels Suffer Major Card Breach

The Intercontinental Hotels Group (IHG) has been forced to reveal yet another major data breach of customer card details over the latter part of 2016. In a lengthy missive on Friday, the group explained that an unspecified number of IHG hotels run as franchises were affected between September 29 and December 29 last year.

Read the source article at Infosecurity Magazine

Cisco UK & Ireland Blog » 5 Reasons Retailers are Top of the Hacker Hit-list

Retail sales may be under threat in the UK as consumer confidence wavers, but the prospects of hitting the shops has never been so appealing. With cyber-criminals, that is. The retail industry is a top target for cyber-attacks, and the hackers are more than keeping pace with digitisation.

Read the source article at Cisco Global Blogs

IT Security Training White Paper: 10 Network Security Tools and Tests Everyone Should Use

Whether you are operating a home system, overseeing a small startup, or performing security governance for an enterprise, everyone can benefit from paying attention to security. This paper provides a list of 10 security tools or tests that will help you check out suspicious issues and keep ahead of new risks and threats. At this point, everyone should be aware that security management is essential for everyone.

Read the source article at Global Knowledge

Neiman Marcus: 2015 Breach Exposed Full Card Details

Hackers aren’t giving luxury retailer Neiman Marcus Group a break. See Also: 2017 Predictions on Data Security: Insights on Important Trends in Security for the Banking Industry On April 14, the company disclosed to the California attorney general that a December 2015 breach compromised more sensitive information than first thought.

Read the source article at bankinfosecurity.com

A New Wave of IoT Security Threats Are Coming — Here’s How to Mitigate Them

The Internet of Things poses a cybersecurity challenge for many companies, but there are practical steps IT and business leaders can take to diminish the threat. The Mirai botnet that took down the domain name system provider Dyn in a massive distributed denial of service attack last fall awakened the world to the vulnerability of Internet of Things devices.

Read the source article at biztechmagazine.com

CenturyLinkVoice: 3 Barriers To Cybersecurity Success And How To Overcome Them

2016 was a record year for data loss with reported breaches exposing almost 4.3 billion records. While the reported number of incidents has not increased year over year, the average breach was more severe – and exposed more records – than in previous years. You only need to look at the number of compromised records at three breaches in 2016 to see examples of the severity: Yahoo, FriendFinder and MySpace.

Read the source article at Forbes Welcome

Creating a Culture of Security in Your Organization – Research Blog

Your organization may say it’s committed to security, but allowing employees to bring their own devices (BYOD) or unsecured laptops leaves the door wide open to catastrophic data loss. According to the 2016 Ponemon Cost of Data Breach Study, the average consolidated total cost of a data breach jumped from $3.8 million to $4 million. But what are the chances your organization will actually be affected?

Read the source article at indusface.com

The Biggest Risk to Your Cyber Security Is Your Company

Digital security can no longer be ignored by busiensses. Companies and organisations that fail to identify the most common, significant and serious security concerns or threats are far more likely to be targeted by malicious users or suffer a breach.

Read the source article at Acumin Recruitment & Consulting

5 Consequences That Result From Not Meeting Data Security Requirements

As more businesses start to enhance their user experience, platforms, and products with personal data, data security becomes more important for consumers and business owners. While it might seem tedious, there are laws and systems in place to make sure that company’s play ball when it comes to the protection of personal information, but there are still business owners who fail to meet the stipulated requirements.

Read the source article at dzone.com

How to fend off cyberattacks and data breaches

Experts in online security and data protection explain how smaller businesses can prevent security breaches and digital attacks. According to research conducted by Symantec, the number of cyberattacks against small businesses (companies with fewer than 250 employees) has been steadily growing over the last six years, with hackers specifically targeting employees (phishing).

Read the source article at CIO.com

Report: 95% of employers have employees who breach network security

Employers who want to steal data or engage in other restricted behavior will do so once they find a way. Policies and enforcement procedures must be in place, but if workers are intent on finding ways to break through security systems, there’s a sure bet they’ll attempt to find ways around HR’s ground rules.

Read the source article at HR News and Analysis

SecurityMetrics 2017 PCI Guide Simplifies PCI Compliance Process

/PRNewswire/ — Many businesses still struggle with PCI compliance, making them vulnerable to data attacks. According to SecurityMetrics’ latest forensic data, the average merchant, at the time of data compromise, wasn’t compliant with at least 47% of PCI DSS requirements. The SecurityMetrics 2017 Guide to PCI DSS compliance demonstrates recent forensic data to show where many businesses are not compliant.

Read the source article at PR Newswire

How To Make Customers And Employees Feel Safe

As a business owner, you’re responsible for the safety of your employees and patrons. Ask yourself: Do your customers and workers feel physically secure when they’re in your store? Do your patrons feel confident using their credit cards? To run a successful business, you need to be able to answer “yes” to these questions without hesitation. If you think your store could use some help in these areas, consider implementing the ideas below.

Read the source article at home – Information Security Buzz

Insights from a PCI Forensic Investigator

At the PCI Acquirer Forum in Las Vegas on 9 May, PCI Forensic Investigator (PFI) Tom Arnold, Payment Software Company, will share with acquirers and processors insights and recommendations from recent data breach investigations. Ahead of his presentation, he discusses some of the challenges he sees in payment security and what keeps him awake at night.

What role do you play in merchant payment security as a PFI?

Read the source article at PCI Perspectives

Defending against ransomware attacks in the payment card industry – IT Governance Blog

Ransomware is currently the biggest cyber security concern for many businesses, and the danger of an attack is continuing to grow. There has been a 600% growth in new ransomware families since December 2015, according to a recent Payment Card Industry Security Standards Council (PCI SSC) guide, which also reported that ransomware crime cost businesses an estimated $1 billion (approximately £800 million) last year.

Read the source article at IT Governance

Point of Sale Hacking and What it Means for Small Businesses

While many business owners purchase point of sale machines with the belief that they are secure, this is often far from the truth. POS, or Point of Sale, hacking is the process of stealing data such as credit card information using remote attacks and malware. More importantly, hundreds of thousands of point of sale hacks happen every year, and some affect thousands of businesses at once.

Read the source article at Threat Sketch

Payment Card Industry Security Compliance: What You Need to Know

A quick refresher on all the different PCI SSC security standards that are relevant for organizations that accept electronic payments. In the dynamic world of payments, transaction security is of paramount importance. When we speak with our customers and partners, the topic of payment security and Payment Card Industry (PCI) compliance always comes up. Although there is a lot of useful information about payment security available, the industry is also filled with many questions regarding PCI.

Read the source article at Dark Reading

Safety First: The Basics of Website Security for Ecommerce Retailers

For ecommerce retailers, website security is the cornerstone of a successful online business. Why? It’s simple: people only want to give their money and their business to companies and organizations that they can trust. If a retailer has an insecure website, then, all other marketing and inbound efforts simply won’t bring results.

Read the source article at HubSpot Blog Homepage

The Growing Threat of Data Breaches in Grocery

With every year that passes, data breaches become a bigger and more frightening threat for retailers. In 2016, nearly 1,000 cases were reported, the highest number since The Identity Theft Resource Center, in San Diego, began keeping records in 2005. And grocers are a hot place for data criminals. According to research from Chicago-based fraud protection firm Rippleshot, they make up the No. 1 channel for data breaches in terms of the percentage of compromised accounts.

Read the source article at Progressive Grocer

Why You Should Think of Security as a Skill, Not Just a Role

A common mistake that we see organizations make is putting off security until they hire someone who specializes in it. Depending on the size of your company and the nature of your business, this could mean waiting several years to start taking security seriously. In today’s threat environment, that’s not realistic or practical.

Read the source article at Cloud Security News, Cloud Security Blog

What every business should know about Cyber Security

The exponential growth in technological developments in recent years has led to a number of new opportunities and an increase in efficiency for businesses big and small; however, these developments have also brought about a number of threats that have not been encountered before. Cyber security, or the protection of data, networks and systems in cyberspace, will rapidly become business critical as more and more devices become part of the ‘Internet of Things’.

Read the source article at csgrp.co.uk

5 Reasons You Should Be Paying Attention to Cybersecurity

In a joint Oracle and Inc. study, the leaders of the fastest-growing companies in America were surveyed about the qualities that made them personally successful, the reasons for their businesses’ success, and their plans for the immediate future. The results? It all comes down to sales, talent, and explosive growth. On the other end of the spectrum, these business leaders did not feel that “managing security” and being “tech savvy” were key factors to their success.

Read the source article at inc.com

Do you think your business is safe? Think again

Statistics show that small and mid-sized businesses are not immune to cybercrime, and as much as 50 per cent of the businesses reported to have at least one cyberattack in the last 12 months. It cost these businesses well over US$955,000 for restoration. The global cybercrime cost is expected to cross US$2 trillion by 2019.

Read the source article at Yahoo News Singapore

3 challenges to securing business data

Success in today’s fast-moving business world hinges on innovation — and data is its lifeblood. But data-driven innovation faces escalating risks from attacks types that are constantly evolving to uncover new vulnerabilities and ultimately, steal valuable data. Staying ahead of cybercriminals requires continually adapting and growing security controls and practices. Many businesses, though, aren’t heeding cybersecurity’s growing warning signs.

Read the source article at csoonline.com

10 Important Cyber Security Tips For Small Business Owners

Massive kind of cyber security breaches that shattered some top enterprises threw the topic of cyber security to the popular discussion. Though only large companies find their way to the headlines, small businesses are not free from several cyber security threats. The horrible fact remains that the impact of cyber-attack on a small business can often be devastating.

Read the source article at TG Daily

Keeping Your Business Information Safe

As businesses increasingly move online, new threats to their information security have emerged. Hacker attacks and other security breaches are on the rise, and 70 percent of organizations report having been victims of a successful cyberattack in 2014. With the average cost of a corporate data breach hovering around $3.5 million, protecting critical business information is essential to the bottom line of any business.

Read the source article at TechZone360

Cyber Attacks: Are you prepared?

The Management Association of the Philippines’ (M.A.P.) participants in last week’s Forum on “Cyber Resilience: A New Board Room Priority” showed that cyber security awareness is growing. More organizations, government or private, realize that their networks are vulnerable to an attack. The ICT department alone cannot handle security; every employee, with the Board leadership, have a part to play. Any organization must prepare its way and bounce back quickly to inevitable cyber attacks.

Read the source article at BusinessWorld

Prevention Is Key To Enterprise Security Architecture

Prevent, detect and respond are the three pillars of the enterprise security architecture. When enterprises look for the right security framework, there is a growing inclination for CISOs and security heads towards the detect and respond mechanism. Very few place ‘prevention’ at the core of their security strategy. The prevention focused security framework however is gaining prominence in recent times.

Read the source article at cxotoday.com

4 Ways Employees Enable CyberSecurity Hacks and How To Prevent It

Although you may have heard this all before, hackers are more innovative now, than ever. It’s time for a refresher. As you are well aware, your company has a lot of information and communication flowing from person to person, within and outside the organization. This flow keeps your company running, and it’s an integral part of the relationship between your business and your clients.

Read the source article at IT Solutions and Security Solutions

Small Businesses Continue to Believe They Aren’t at Risk for a Security Incident

I’ve been writing about security for so long now that very little surprises me – except for this: The continued reluctance of small and medium-sized businesses (SMB) to accept that they are, and will be, targets for hackers and subject to many of the same types of security risks as larger enterprises. A recent study conducted by Manta found small businesses lack basic security policies and practices, likely because the vast majority (87 percent) don’t think they are at risk of a data breach.

Read the source article at IT Business Edge

4 Security Questions to Ask When Outsourcing IT Operations to Make Sure Your Business Isn’t at Risk

Outsourcing IT operations to managed IT services providers (MSP) is a common trend for a business looking to maintain its operational efficiency while cutting down on cost. In addition to assisting with IT infrastructure management, 38 percent of businesses that hire an MSP do so with the expectation that their business will have enhanced security and meet regulatory compliance requirements. However, it is critical to understand that “IT management” and “IT security” are not synonymous.

Read the source article at Entrepreneur

Signs That You’re About to Suffer a Security Breach

Do you ever get those thoughts in the back of your mind that somehow, at some point, your organization is going to experience a security breach? I know that’s the kind of stuff that tends to keep chief information security officers (CISOs) and other security leaders up at night. The thing is, much of these thoughts are just that — thoughts. Thoughts, in and of themselves, really mean nothing when it comes to security incidents and breaches.

Read the source article at Security Intelligence

Startup Security Tips 101: Don’t Become a Statistic

According to a 2016 report from Small Business Trends, 43 percent of cyberattacks target small businesses. Unfortunately, once attacked, 60 percent of them close their doors within six months. The reality is that today’s startups and smaller organizations face unprecedented security challenges. But when asked, only 14 percent classify their ability to mitigate these threats as […]

Read More – Startup Security Tips 101: Don’t Become a Statistic

Read the source article at Secplicity

Key Data-Security Measures for Every Business

Data security is the biggest concern for any business from small to big as they hold lots of sensitive information. But when you consider all the essential information you store practically right from clients’ personal information to financial records, it is not quite difficult to understand why just one single breach could completely cripple your business.

Read the source article at BusinessZone

Top 7 Questions to Ask Your Vendors about Their Security Policies

Cyber security is one of the most critical issues the U.S. faces today. The threats are real, and the need is pressing. The cyber security status is unstable, especially when considering the enormous and growing scope of these threats. So, cyberspace’s dynamic nature must be acknowledged and addressed by policies that are equally dynamic. As many breaches happened previously via targeting vendors first, so there is a need to address cyber threats associated with the vendors.

Read the source article at InfoSec Resources

Top 5 Cyber Security Mistakes Corporations Make – Macate Group

There was a total of 1,093 data breaches among U.S. companies and government agencies, which is a 40% increase from 2015 according to the Identity Theft Resource Center. Out of all the different organizations, the business sector had the most data breach incidents and represented 45.2% of the total number of cyber security breaches. It’s now 2017 and if corporations want to keep up with more advanced malware and hacking techniques, they need to stop making these common cyber security mistakes.

Read the source article at Macate Group – The Future Secured

Setting Up Security as a Business: 3 Best Practices for Security Execs

At the beginning of March 2017, a third-party platform launched that promises to be a bidirectional clearinghouse to improve the security industry’s approach to third-party risk management. Called CyberGRX, the company says it will dramatically alleviate what is now a manual, spreadsheet-driven process of vendors being inefficiently assessed by customers. It will allow security teams for both companies and customers to focus on protecting their respective businesses.

Read the source article at Dark Reading

Security Measures Every Business Should Consider

Cyber criminals do not discriminate in any business – regardless of the size and the reputation of the business they are a potential threat to make your business a victim of fraud and hacking attacks. In fact, often the startups and the small businesses are likely to be more tempting to them because they are more susceptible and more often than not they do not have the apt security mechanisms that the bigger companies do. Having said that, hacks are becoming more and more popular worldwide.

Read the source article at Technivorz

Ensuring Proper Cyber Security Measures for Small Businesses

Cyber security issues for small businesses have been showing an increasing trend in the last five to six years. In fact, small businesses are preferred targets for many cyber criminals; the reasons are obvious. Firstly, many small businesses won’t be having the resources to invest in security, especially the way big enterprises do. Secondly, there might not be trained security personnel in such small companies and the employees working there might not be too security conscious either.

Read the source article at Know about SSL and the latest threats

Cyber Security and a Secure Business: What You Need to Know

How safe and secure is your business? It’s a question that every business owner should ask. In the last year, half of small to medium businesses have been hacked, and the FBI recently warned that malware attacks–which deploy infected software to your devices or servers–has increased. These and other cyber security issues are critical concerns for business owners.

Read the source article at paychex.com

Proactive security approach: 3 tips to prevent cyber attacks

With cyber threats growing more rapidly than ever, the issue of security has been brought to the forefront of every CIO’s mind. Today, cyber crime is a billion dollar enterprise, and it’s on the rise. According to data from Arbor Networks, the number and size of cyber attacks increased by 73% in 2016. With the incidents of cyber attacks growing year over year, no organization, regardless of size or industry, is free from the risk of a data breach.

Read the source article at Arrow Magazine

8 Solid Cyber Security Measures for Small Businesses

The rate of cyber attacks targeting small businesses has been mounting since 2011. Symantec, the global web and system security company in its 2016 Internet Security Threat Report has showcased how cyber security issues for small businesses have increased in the recent years. A handful of reasons suggests why small businesses are aimed by hackers and cyber criminals. These are the reasons which contribute to the increasing levels of cyber security attacks against small businesses.

Read the source article at TG Daily