5 Things E-commerce Business Owners Should Know About Cybersecurity

The e-commerce market is constantly growing as there are new online businesses being opened every single day. And every company that sells stuff online holds onto each of their customers’ personal information. Because of this, e-commerce businesses are quite attractive to hackers and there are tons of companies who unfortunately had to deal with hacker attacks on their databases.

Read the source article at IT Communities

Business needs to get real about cyber security, warn BT and KPMG

Cyber security must become something that everyone in an organisation always thinks about, according to the latest report on securing the digital enterprise by BT and KPMG. The global ransomware attack in May 2017 affected more than 200,000 computers in over 150 countries, including in the UK where the NHS was forced to restrict operations and turn away patients. Is this wake-up call for businesses to finally pay serious attention to cyber security?

Read the source article at computerweekly.com

6 Tips To Build A Cyber-Security Culture At Work

Symantec’s 2016 Internet Security Threat Report shows that almost half of all cyber security attacks target small businesses with less than 250 employees. According to the U.S. National Cyber Security Alliance, 60 percent of small businesses cannot sustain their businesses beyond six months after a cyber-attack. Even big companies can experience a long-term hit to their brand and revenue after an attack.

Read the source article at huffingtonpost.ca

Consistent Software Patching Can Solve Your Security Woes

Security is an imperfect art. It’s also an imperfect science. Whether it involves experimenting with certain tweaks or implementing proven standards and prescriptive advice, figuring out how to manage a security program is as complex as navigating any other business function. According to the Pareto Principle, security professionals should focus on the 20 percent of security issues that cause 80 percent of their problems.

Read the source article at Security Intelligence

7 Best Practices Small Businesses Must Adopt Against Security Breaches

Instances of security breaches and information leaks where large companies are the “Target” easily make the headlines. You’ll hear of the millions of dollars in losses incurred by the companies and the damages they ended up paying. However, in recent times, a new realization is emerging. Small businesses employing fewer than 100 employees are the victims of 71% of cyber crimes.

Read the source article at The Global Dispatch

Are businesses over confident in their cyber security capabilities?

With the number of data breaches increasing and nearly 1.4 billion data records lost or stolen last year, it’s never been more important that businesses have confidence in their cyber security solutions, and understand which technologies best protect them. For example, the vast majority of IT professionals still believe perimeter security is effective at keeping unauthorised users out of their networks, according to the findings of Gemalto’s latest data security report.

Read the source article at information-age.com
None

Report: Major Cloud Services Attack Could Cost $53 Billion

What trait does a global cyberattack and a hurricane share? Both could cost insurers – and victims – dearly, according to a report published Monday by insurance giant Lloyd’s of London. See Also: How the New World of Digital Banking is Transforming Fraud Detection A global, major attack on cloud computing services could cost an average of $53 billion, according to the report, which was co-written with Cyence, a firm that helps the insurance industry evaluate cyber-related risks.

Read the source article at databreachtoday.com

Time to get real. Cyber threats are everywhere.

Are you concerned about cybersecurity? You should be. We read of Russian meddling in our last election. We hear about ransomware attacks bringing large and small organizations to a standstill. Meanwhile, countless denial-of-service attacks seek to interfere with our favorite social media apps and services. Just last week we learned of widespread cyber hacking of our nuclear plants and power grid.

Read the source article at Washington Post
None

Mitigating cyber threats: Breaches show companies of all sizes need to plan ahead for cybersecurity

The malware attack against a Grand Rapids-based medical supplier serves as a reminder of the constant cyber threats businesses of all sizes face. Airway Oxygen Inc. reported to customers last month that it had been hit in mid-April by a ransomware attack that encrypted its data. The attackers accessed patient data on about 550,000 past and present customers and some 1,160 current and former employees.

Read the source article at mibiz.com
None

Security Hygiene Tips to Prevent Malware Infection & Stop Lateral Movement | Duo Security

Malware, ransomware, wipers, whatever you want to call them, they’re quite adept at spreading – whether across the web or laterally across your internal network. From stopping the initial point of infection to narrowing its path of destruction, here are some tips from the US-CERT (United States Computer Emergency Readiness Team) to help organizations of all sizes stay safe: Taking steps toward good security hygiene can help prevent initial malware infection.

Read the source article at The Trusted Access Company
http://retailanditconsulting.com/wp-content/uploads/2017/07/curata__xlqtxt1xarhmnqk.jpeg

Customers Seek Threat Protection Across WAN, Access and Data Center

Many of you are familiar with the WannaCry ransomware attack that struck businesses in over 150 countries worldwide in May 2017. Targets of the attack included huge corporations and organizations in the UK and U.S. in sectors as diverse as healthcare, telecommunications, logistics, manufacturing and even government. Now, with WannaCry barely in the rearview mirror, more recent headlines show a new generation of threats proliferating on a global scale at even faster rates.

Read the source article at Cisco Blog
http://retailanditconsulting.com/wp-content/uploads/2017/07/curata__iayzcaywgxvhq7c.png

NotPetya: Ransomware or Wiper? – Daily Security Byte

Is Petya 2.0 really ransomware, or is it a “false flag” nation state attack designed to damage organizations in the Ukraine, while distracting the press? That’s the question some researchers are asking of this new ransomware (or should I say wiper?). Today’s video covers some of the latest details from researchers reverse engineering Petya 2.0. […]

Read More – NotPetya: Ransomware or Wiper? – Daily Security Byte

Read the source article at Secplicity
http://retailanditconsulting.com/wp-content/uploads/2017/07/curata__d0dbqkt4ny9oalc.jpeg

June 2017: The Month in Ransomware

When it seemed that ransomware authors hit the lowest of the low with their attacks a long time ago, they managed to take it a notch further last month. With the revamped Petya Trojan that surfaced on June 27, the crooks broke new ground and started waging a real cyber war against a particular country. This toxic code renders computers inoperable, and paying the ransom does absolutely nothing.

Read the source article at tripwire.com
http://retailanditconsulting.com/wp-content/uploads/2017/07/curata__vmgiwucnmkw1wf5.jpeg

From Ransomware to Wiperware: The Politics of Analyzing a Cyberattack

Over the past few months, we’ve seen some major attacks and traumatic events worldwide. In fact, it seems that each time I stepped on or off a plane, some sort of major event had accompanied my arrival. For example, when I landed in Chicago last month, the WannaCry attack was all over the news, accompanied by political upheaval in the United States, France and the United Kingdom. As I flew to London the next week, the London Bridge attack was already underway.

Read the source article at certification.comptia.org
http://retailanditconsulting.com/wp-content/uploads/2017/07/curata__oz8327cltntwg0d.png

The 5 W’s of investigating cyber attacks

CSO magazine estimates that Cyber crime damages costs will hit $6 trillion annually by 2021. The recent WannaCry ransomware attack that affected over 100 countries and organizations in multiple industries was a stark reminder that cyber attacks are a very real threat. In 2016, there was a 600% increase in the number of ransomware attacks, a trend that seems set to grow without appropriate and rapid action.

Read the source article at us.smoothwall.com
http://retailanditconsulting.com/wp-content/uploads/2017/07/curata__k8dpmxonrycd3ix.png

The Biggest Cybersecurity Disasters of 2017 So Far

The first six months of 2017 have seen an inordinate number of cybersecurity meltdowns. And they weren’t just your standard corporate breaches. It’s only July, and already there’s been viral, state-sponsored ransomware, leaks of spy tools from US intelligence agencies, and full-on campaign hacking. And that’s just the beginning. Let this recap of 2017’s biggest cyber-incidents so far serve as a reminder of just how chaotic things have already gotten–and the year’s only halfway done.

Read the source article at www-wired-com.cdn.ampproject.org
http://retailanditconsulting.com/wp-content/uploads/2017/07/curata__ge0fyiifqp4qyip.jpeg

The Risky Business of Being Over-Exposed to Online Cybersecurity Threats

If your business is on the internet in Hong Kong, Samoa, or Zimbabwe, you are operating in one of the three countries in the world that are “most exposed” to cyberattacks, according to a June 14 report from security data and analytics software company Rapid7. Cybersecurity threats aren’t restricted by physical borders. Cyberattacks can happen anywhere and be associated with any device connected to the internet.

Read the source article at bna.com
http://retailanditconsulting.com/wp-content/uploads/2017/07/curata__e4kgvhrjdge8mib.jpeg

Updates to NotPetya Lead to Server Seizure at …

Police seized servers from Ukraine’s Intellect Service as the country scrambles to control a cyberattack allegedly conducted by advanced hackers. Ukrainian law enforcement has seized servers from software firm Intellect Service, makers of the M.E.Doc accounting software widely exploited last week in destructive cyberattack researchers report was conducted by highly skilled threat actors.

Read the source article at Dark Reading
http://retailanditconsulting.com/wp-content/uploads/2017/07/curata__j6en0xarcsvpksk.jpeg

Patch management could have stopped NotPetya attacks: Verizon

Good patch management could have stopped the spread this week of the NotPetya ransomware, says one of the world’s expert investigators of cyber breaches. “It’s interesting me they’re successful at all because they’re attacking known vulnerabilities,” David Ostertag, global security investigations manager at Verizon Enterprise Solutions, told Canadian reporters on Wednesday.

Read the source article at itworldcanada.com
http://retailanditconsulting.com/wp-content/uploads/2017/07/curata__ublnxnrte6fabd5.jpeg

22,000 patients affected by ransomware attack on Cleveland Medical Associates

Cleveland Medical Associates began notifying 22,000 of its patients of an April 21 ransomware attack that may have compromised patient data. The compromised computer was both locked and encrypted, and there is currently no evidence the patient data was impacted. The attack did not impact patient care at Cleveland Medical.

Read the source article at Healthcare IT News
http://retailanditconsulting.com/wp-content/uploads/2017/07/curata__uuwwkhrexvnwu1i.jpeg

As Ransomware Attacks Spike, Organizations Need to Catch Up

The latest operating systems provide better security than ever. But as the WannaCry outbreak demonstrated, many devices still run older, no longer supported operating systems, and many organizations and individuals became malware victims, in part, because of their reliance on those outdated systems. See Also: Spear Phishing, Identity Deception, Ransomware: How to Predict the Future of Crime Whose fault is that?

Read the source article at bankinfosecurity.com
http://retailanditconsulting.com/wp-content/uploads/2017/07/curata__yn6osh5u0kijf3p.jpeg

Petya: Prevention and Protection from New Ransomware Attack | Acronis

Another fast-moving ransomware attack is tearing across the globe, striking a number of high-profile businesses, transportation networks, public utilities and government agencies in Europe and the United States. The attack was initially focused in Ukraine and Russia. The National Bank of Ukraine saw ATMs across the country go down, and systems monitoring radiation at the former Chernobyl nuclear power plant were also affected. Russia’s largest oil company, Rosneft, was also hit.

Read the source article at acronis.com
http://retailanditconsulting.com/wp-content/uploads/2017/07/curata__j4stfjrsm1ll35u.jpeg

Who’s responsible for Cyber Security at my Company?

Many companies hold IT solely responsible for online information privacy and security, but experts agree that this is not a sustainable security business model. In an interview with the Wall Street Journal, Former CIA and NSA Director, Gen. Michael Hayden, calls cyber space “… the largest ungoverned space in recorded human history,” adding “there is no rule-of-law [online]”.

Read the source article at CyberTraining 365 Blog
http://retailanditconsulting.com/wp-content/uploads/2017/07/curata__mkipzaxsvnlnzmu.png

6 ways to develop a security culture in your organization

6 ways to develop a security culture from top to bottom With our modern dependence on technology and security, nobody would dare to make this statement. Everyone knows how crucial security is and how it must be embedded into everything an organization does. A simple glance at the news provides details on the data breach of the day tied to an application security vulnerability.

Read the source article at Home | TechBeacon
http://retailanditconsulting.com/wp-content/uploads/2017/07/curata__nu1phnmyrh2fmpi.jpeg

How artificial intelligence is taking on ransomware

NEW YORK — Twice in the space of six weeks, the world has suffered major attacks of ransomware — malicious software that locks up photos and other files stored on your computer, then demands money to release them.

It’s clear that the world needs better defenses, and fortunately those are starting to emerge, if slowly and in patchwork fashion. When they arrive, we may have artificial intelligence to thank.

Read the source article at StarTribune.com
http://retailanditconsulting.com/wp-content/uploads/2017/06/curata__gizfgfznmludmyk.png

Petya/NotPetya: What We Know in the First 24 Hours | SecurityWeek

The Petya/NotPetya outbreak that originated in Ukraine on Tuesday but spread globally within hours might have been more than a financially motivated ransomware incident, security researchers suggest. The attack caught security researchers’ attention because the same EternalBlue SMB exploit employed by WannaCry was used to spread to new machines, and because of the fast pace at which reports of infections started to emerge worldwide.

Read the source article at securityweek.com
None

Half of Ransomware Victims Are Hit Multiple Times

Half of organizations hit by a ransomware attack are struck multiple times, with exposed infrastructure stretching well beyond the endpoint, according to a new study from Druva. The security vendor polled over 830 IT professionals across the globe to compile its Annual Ransomware Report. It revealed that 80% believe attacks are increasing, with half of those already struck claiming that they’d been hit more than once.

Read the source article at Infosecurity Magazine
http://retailanditconsulting.com/wp-content/uploads/2017/06/curata__i80lngargmon9bl.jpeg

NotPetya Ransomware Devastates Organizations, Hospitals, Banks, and Transportation

The latest ransomware attack has greatly impacted Europe and the U.S. on June 27th, 2017. A U.S. hospital is among the victims of this large scale cyberattack. Pharmaceutical companies, Chernobyl radiation detection systems, the Kiev metro, an airport, and banks have been affected across Europe. The further implications of this attack are yet to be fully realized. The ransomware is called NotPetya and upon infecting a computer demands $300 for the unlock key.

Read the source article at crossroadstech.net
http://retailnetworksecuritysolutions.files.wordpress.com/2017/06/curata__4wcitdwfe8bfear.png

Cybersecurity Training Often a Tangled Web

Damaging cybersecurity attacks have become an increasingly regular occurrence in business. In 2013, Target Corp. notified 70 million customers that hackers had stolen their personal data from their computer systems. In 2016, Yahoo Inc. informed 500 million users their names, email addresses, dates of birth and telephone numbers were stolen by hackers. And just this week, a massive ransomware attack hit computer systems across Europe and the United States, the second such attack in two months.

Read the source article at Chief Learning Officer
http://retailnetworksecuritysolutions.files.wordpress.com/2017/06/curata__a6u9ekh3u8ziewg.jpeg

Basic Cybersecurity Hygiene Tips Are Ransomware Vaccine

Companies that follow basic cybersecurity hygiene are likely to avoid the ravages of global ransomware attacks such as the one that crippled thousands of computer systems June 27, cybersecurity pros told Bloomberg BNA. The global ransomware attack struck at the core of major organizations, such as shipping magnate A.P.

Read the source article at bna.com
http://retailnetworksecuritysolutions.files.wordpress.com/2017/06/curata__e4kgvhrjdge8mib.jpeg

Are mass cyber security attacks like WannaCry and Petya now the norm? | The latest news from the Computer and IT Industry

Ransomware now has to be the number one issue for governments and security experts put in charge of fighting cybercrime. In fact, it should be the top concern for anyone running a business or even anyone who owns a computer. It has already been proven that last month’s WannaCry was not a one off. As the ‘Petya’ ransomware sweeps around the world, infecting systems in Russia, Europe, the US (and everywhere in between), IT security experts are signalling the dawn of a new era.

Read the source article at pcr-online.biz
http://retailanditconsulting.com/wp-content/uploads/2017/06/curata__nsuwowzz7z6v8hj.jpeg

Cyber-attack was about data and not money, say experts

The Petya malware variant that hit businesses around the world may not have been an attempt to make money, suspect security experts. The malicious program demanded a payment to unlock files it scrambled on infected machines. However, a growing number of researchers now believe the program was launched just to destroy data. Experts point to “aggressive” features of the malware that make it impossible to retrieve key files.

Read the source article at BBC – Home
http://retailnetworksecuritysolutions.files.wordpress.com/2017/06/curata__m7fsirn3vuki8qj.jpeg

Global ransomware attack may not have been for money

The dramatic data-scrambling attack that hit computers around the world Tuesday appears to be contained. But with the damage and disruption still coming into focus, security experts worry the sudden explosion of malicious software may have been more sinister than a criminally minded shakedown of computer users.

Read the source article at cnbc.com
http://retailnetworksecuritysolutions.files.wordpress.com/2017/06/curata__kvt0g95mlgb118e.jpeg

Where Business is Getting IoT Security Wrong

Securing IoT is tricky business. IoT exploits include firmware spoofing, compromising hardware, man-in-the-middle attacks, interface exploits, and cloud hosted application hacks, among others. Businesses are not always ready for the unique security challenge posed by the massive deployment of IoT devices.

Read the source article at IT Communities
http://retailnetworksecuritysolutions.files.wordpress.com/2017/06/curata__ci159jyfp3li6as.jpeg

Lexmark discusses security – The Recycler

After the WannaCry virus infecting hospitals and businesses worldwide, Lexmark looks at the risks and solutions. As cyber attacks hit the headlines again Lexmark said that it is “riskier than ever” having employees travelling with computers and “mobile devices that allow access to emails, files and data”.

Read the source article at therecycler.com
http://retailnetworksecuritysolutions.files.wordpress.com/2017/06/curata__xecqluz96lnvijf.jpeg

Anatomy of a secure internet-connected thing

Now working as director of product security at Silicon Labs, he discusses the steps required to make IoT devices properly secure. Many of the things we use on a daily basis are becoming smart and connected to the Internet. The Internet of Things (IoT) will improve our lives by helping us reach our health and fitness goals, reduce resource consumption, increase productivity, and track and secure our assets.

Read the source article at Electronics Weekly
http://retailnetworksecuritysolutions.files.wordpress.com/2017/06/curata__8piuqxb8wy249cg.jpeg

Identifying and Overcoming Cybersecurity Risks: 5 Steps

Like it or not, modern businesses are placing themselves in the firing line if they fail to take action to protect themselves from hackers. The recent global cyber breach outlined how important information security is to business. The cost to organizations, including the U.K.’s National Health Service (NHS), is estimated to run into the billions. WannaCry was the name given to the malware that infected computers running Windows XP.

Read the source article at Data Center Magazine
http://retailnetworksecuritysolutions.files.wordpress.com/2017/06/curata__cdgu5ookxwsr30q.jpeg

The cyber security challenge for retail branch IT – Information Age

Over the last few months, cyber security has been one of the most talked about challenges for businesses across all industries. This is put into sharp focus with recent media coverage of cyber attacks that have affected thousands of companies across the globe. The retail sector is in the frontline of the cyber attack battle. Retailers need to be concerned about the security of their own data, and that of their customers. Lack of customer confidence in data security impacts brand value.

Read the source article at information-age.com
http://retailnetworksecuritysolutions.files.wordpress.com/2017/06/curata__utw1lxo4ltmpwqr.jpeg

Top 8 Cyber Security Attack Types and How to Avoid Them

HPE Secure Compute: Find out how security information management, governance, application security and event management help you avoid the top eight cyber security attack types—while reducing the cost of cybercrime. Cyber security attacks are continuing to grow in both volume and sophistication. Cybercriminals now take computer systems hostage at hospitals across the U.S., and they target banks around the world—even stealing $12.7 million in a massive ATM heist in Japan.

Read the source article at Community
http://retailnetworksecuritysolutions.files.wordpress.com/2017/06/curata__ur3ypybj2ntqeq0.jpeg

Cybersecurity Governance: Transform Mediocrity into Excellence

Good cybersecurity requires full commitment from senior management: in fact the international standard for information security demands it. The concept of strong leadership lies at the heart of ISO 27001: “Top management shall demonstrate leadership and commitment with respect to the information management system”. That puts responsibility for creating and maintaining an environment in which excellent security can flourish squarely in the C-Suite’s lap.

Read the source article at Infosecurity Magazine
http://retailnetworksecuritysolutions.files.wordpress.com/2017/06/curata__61w9j4xqrm7ttqp.jpeg

How to protect your startup from a cyber crime crisis | Security

Startups that regard themselves as too small to be targeted by cyber crime are putting their businesses at considerable risk. Two thirds of small UK businesses were attacked by hackers in the past two years. This assumption, combined with a lack of cyber awareness and dedicated IT teams, makes startups tempting targets to well-funded networks of cyber criminals. Unfortunately, the result of poor cyber security is only apparent after your startup has been hacked.

Read the source article at techworld.com
http://retailnetworksecuritysolutions.files.wordpress.com/2017/06/curata__4x1bua3rqajo9dj.jpeg

3 Cybersecurity Practices That Small Businesses Need to Consider Now

All businesses, regardless of size, are susceptible to a cyberattack. Anyone associated with a company, from executive to customer, can be a potential target. The hacking threat is particularly dangerous to small businesses who may not have the resources to protect against an attack let alone ransomware.

Read the source article at Tech.Co
http://retailnetworksecuritysolutions.files.wordpress.com/2017/06/curata__9ty1slhiiw25qru.jpeg

Ten Cybersecurity Tips for Small Businesses

Broadband and information technology are powerful tools for small businesses to reach new markets and increase sales and productivity. However, cybersecurity threats are real and businesses must implement the best tools and tactics to protect themselves, their customers, and their data.

Read the source article at Minority Business Development Agency
http://retailanditconsulting.com/wp-content/uploads/2017/06/curata__s2qtpcm16kpfwj8.jpeg

The Newbie Retailer’s Guide to E-commerce Security

A secure web environment ensures the protection of customer data, but it also makes for a fast and optimized website that drives conversions. An unsecured web environment will be slow, frequently unresponsive, and even dangerous. Opening your first online store is an exciting milestone, and security should be one of your priorities. It’s important that you take control and ownership of your e-commerce security.

Read the source article at tripwire.com
http://retailnetworksecuritysolutions.files.wordpress.com/2017/06/curata__ja1brhzyto0qxuo.png

Ransomware: The Risk is Real | SecurityInfoWatch.com

On May 12, the now-familiar threat of ransomware took the offensive, as more than 230,000 computers in 150 countries were encrypted for ransom at hospitals, telecommunications systems, governments, banks and more. Known as “WannaCry,” the ransomware demanded 300 bitcoin in exchange for decryption. The attack exploited known vulnerabilities in an older version of Microsoft Windows – vulnerabilities that could have been avoided with recent patches.

Read the source article at Security Magazines
http://retailnetworksecuritysolutions.files.wordpress.com/2017/06/curata__ifa4zfizmr90qz4.jpeg

How to protect your business data from cyber -attacks?

“By 2018, 40 percent of large enterprises will have formal plans to address aggressive cybersecurity business disruption attacks”-Gartner. Stories of cyber threats disrupting businesses hit headlines almost daily. Cyber-attacks vary from phishing to DDOS attacks to SQL attacks to malware – with ransomware being the latest. So, cyber- attacks have different forms but have one aim – ‘disruption’. They reach deeply into the IT systems and lead to widespread business damage.

Read the source article at mdsc1.com
http://retailnetworksecuritysolutions.files.wordpress.com/2017/06/curata__nubttmeuwnvggxe.jpeg

GameStop Confirms Payment Card Breach | SecurityWeek

Video game and electronics retailer GameStop has started warning customers that their personal details and payment card data may have been stolen by cybercriminals. Security blogger Brian Krebs reported on April 7 that the GameStop.com website had apparently been breached. Krebs learned at the time from his sources in the financial industry that hackers had stolen names, addresses and card data entered on the site between mid-September 2016 and early February 2017.

Read the source article at securityweek.com
None

Apple Mac computers targeted by ransomware and spyware

Mac users are being warned about new variants of malware that have been created specifically to target Apple computers. One is ransomware that encrypts data and demands payment before files are released. The other is spyware that watches what users do and scoops up valuable information. Experts said they represented a threat because their creators were letting anyone use them for free.

Read the source article at BBC – Homepage
http://retailanditconsulting.com/wp-content/uploads/2017/06/curata__kdb5alemi9t4ltn.jpeg

New Mac Malware Discovered on Dark Web as Security Experts Remind Mac Users Not to Be ‘Overconfident’ – Mac Rumors

Two new pieces of malicious software aimed at Mac computers have been discovered on the Dark Web, offered through Malware-as-a-Service (MaaS) and Ransomware-as-a-Service (RaaS) portals and estimated to have been up for around the past three weeks, beginning May 25.

Read the source article at Mac Rumors
http://retailnetworksecuritysolutions.files.wordpress.com/2017/06/curata__ejfy5wzki3pgakr.jpeg

This is the sick new way scammers are trying to hack your computer

Security researchers have uncovered a sick new form of computer-locking ransomware that lures in victims by posing as an appeal to help starving toddlers. With a note titled ‘Save Children’, the malware will encrypt personal files and demand cryptocurrency for their return. The variant first came to light this week (12 June) after the ransom demand was uploaded to ID-Ransomware, an online platform which helps identify known malware strains.

Read the source article at amp.ibtimes.co.uk
http://retailanditconsulting.com/wp-content/uploads/2017/06/curata__kbpw2byjcgqfj9r.jpeg

In the Hacker Age, How Secure Is Your PLC?

Let’s face it, hackers have racked up some pretty impressive scores lately. From the most recent WannaCry attack, to exposing Ashley Madison, to reportedly “stealing an election”, hackers have been busy exploiting vulnerabilities and gaining massive notoriety. A recent study by the Identity Theft Resource Center concluded that in 2016 U.S companies and government agencies were breached 1,093 times. That’s a new record and a 40% increase from the 780 breaches in 2015.

Read the source article at Automation.com
http://retailnetworksecuritysolutions.files.wordpress.com/2017/06/curata__0t5hxw5ilmi6nsl.jpeg

Five ways to protect your business from cyber security breaches

Credit: Hard disk file locked with monitor show ransomware cyber attack internet security breaches. Malware lock file concept for security article i.e. WannaCry or WannaCrypt attack all over the world Businesses across the world were horrified by the tsunami of cyber security breaches that dominated the news recently. Such breaches can cripple organisations and the threat is increasing. Hackers are taking advantage of modern connectivity and increasingly targeting mobile devices.

Read the source article at insidesmallbusiness.com.au
http://retailnetworksecuritysolutions.files.wordpress.com/2017/06/curata__mxxqqal4srrlzd4.jpeg

6 ways businesses can become more digitally secure

Web security is a term we’ve constantly been hearing about in recent days, especially in the news. We’ve seen an onslaught of high-profile hacks, most notably the 2016 US presidential election. Web security will always be a hot topic because of the constant development of technology and how, as a society, we will continue to rely on it. Attacks happen for a number of reasons, but it is usually due to human error. It can be a flaw in the code, an unsecure network, and so on.

Read the source article at Packt Publishing
http://retailnetworksecuritysolutions.files.wordpress.com/2017/06/curata__wmn8xlshwsp2xrf.png

Don’t Forget Basic Security Measures, Experts Say

Some security leaders argue there is little point in worrying about emerging threats when businesses can’t defend against today’s attacks. INTEROP ITX – Las Vegas – New technologies like machine learning, artificial intelligence, and IoT will drive the scale and complexity of cyberattacks. Businesses have every reason to be concerned as the threat landscape continues to grow.

Read the source article at Dark Reading
http://retailnetworksecuritysolutions.files.wordpress.com/2017/06/curata__j6en0xarcsvpksk.jpeg

Credit cards hacks, breaches and thefts: Why they keep happening

SAN FRANCISCO — After the huge Target breach of 2013, you’d have thought retail companies would have figured out how to protect their cash register systems from malware that attempts to steal customers’ data. Then came Home Depot. Then Neiman Marcus. Then Wendy’s. In the past few months, Chipotle, Arby’s and Kmart were all hit. Why are these attacks still happening? Time and money, say experts.

Read the source article at azcentral.com
http://retailnetworksecuritysolutions.files.wordpress.com/2017/06/curata__fkjntirbfnvhvu4.jpeg

Four Takeaways from the WannaCry Ransomware Attacks

The recent WannaCry ransomware attacks put cyber security on the front page of every newspaper in the world. Now, everyone knows what ransomware is and how destructive it can be, but will anything change? Following are four critical lessons that both organizations and individuals should take away from WannaCry. Too many businesses still think that only national or multinational firms, or companies in certain industries, have to worry about cyber security.

Read the source article at medium.com
http://retailnetworksecuritysolutions.files.wordpress.com/2017/06/curata__hlliwajkspnyqzt.jpeg

Cybersecurity: A Small Business Guide

Online threats are on everyone’s minds after this week’s breach at OneLogin. The identity and access management company with over 2,000 enterprise clients was hacked, and the fallout isn’t over. During the security breach, private information about users, apps, and various keys may have been obtained by the still unknown hackers.

Read the source article at Business News Daily
http://retailnetworksecuritysolutions.files.wordpress.com/2017/06/curata__iwvuz7hii9npxeh.jpeg

Why a Security Audit is Vital for Today’s Small Businesses

One of the often overlooked security vulnerabilities for today’s small businesses is a lack of a plan to protect the business’s electronic data. Many owners who would never dream of leaving their office unlocked after hours will leave their electronic data unprotected, often costing their company thousands of dollars in damages when that data is stolen or corrupted. Most small businesses are known to have passwords taped to their monitors or use shared accounts for all of their employees.

Read the source article at Josh Giesing
http://retailnetworksecuritysolutions.files.wordpress.com/2017/06/curata__qtp4xmyg47ecink.jpeg

Good Security Makes Good Business Sense

Nearly every day, a cybersecurity news article hits the press, so it’s not surprising that senior executives are asking their chief information officers and security teams whether their own company might be the next victim of cybercrime. But that’s not the only question they should ask, because preventing cybercrime is not only about managing risk and improving security defenses; an effective cybersecurity program also has the power to create value for an organization and lead to additional revenue, more profit, increased customer sales, and higher levels of customer retention. The cybersecurity field has evolved progressively—initially for defence …

Read the source article at When it Really Matters
http://retailnetworksecuritysolutions.files.wordpress.com/2017/06/curata__bz3dt0tpbz4e3dh.jpeg

5 Essential Measures for a Business Security Plan

The tech-driven transition of business enterprises has brought immense benefits for the organizations. It has quantified work and performance, optimized efficiency, and made it convenient for business organizations to expand their areas of operations and invade new markets on the global spectrum.

Read the source article at tripwire.com
http://retailnetworksecuritysolutions.files.wordpress.com/2017/06/curata__m5y6m31khsfconr.jpeg

7 Fallacies That Could Impact Your Network Security

The mounting threats to network security may stem from external sources, but common misunderstandings about how to protect a business’ networks against them can create one big threat from within. High profile cases regularly make the headlines, proving that even the biggest businesses are failing to understand how to responsibly safeguard against potential attacks.

Read the source article at home – Information Security Buzz
http://retailnetworksecuritysolutions.files.wordpress.com/2017/06/curata__90mi4qrb0wuqyrt.png

How UK organisations are leaving themselves open for cyber attack

UK organisations are leaving themselves wide open to cyber attack despite huge investments in cyber security systems, according to two former hackers now working in cyber defence Organisations such as UK phone and broadband provider TalkTalk claim to take security seriously and have made significant investments in cyber defences, and yet still fall prey to data breaches. From a hacker perspective, many organisations are still leaving the front door open and the windows unlocked.

Read the source article at computerweekly.com
http://retailnetworksecuritysolutions.files.wordpress.com/2017/05/curata__7cgztrzthycmaos.png

7 cyber security threats to SMEs and how to secure against them

Small businesses that see themselves as too small to be targeted by cyber criminals are putting themselves at direct risk. In fact, small businesses are at an equal, if not greater risk of being victims of cyber crime – two thirds of small UK firms were attacked by hackers between 2014-2016, according to a report from the Federation of Small Businesses. Cyber crime can cause massive damage to a young business’s reputation, result in loss of assets and incur expenses to fix the damage caused.

Read the source article at information-age.com
http://retailnetworksecuritysolutions.files.wordpress.com/2017/05/curata__amaopkbfae2wvme.jpeg

Global Ransomware Attack Reminds Us of the Importance of Cyber Security

The Wannacry ransomware attack has many companies once again looking at not only steps they can take to help protect their business from a cyber attack, but also ways to protect their business and its assets in the event of a cyber attack. Most businesses should consider purchasing Cyber Insurance to help protect its business assets in the event of a cyber breach. Our sister company, A Plus Risk & Insurance works with several carriers that are experts in writing cyber insurance.

Read the source article at A Plus Benefits
http://retailnetworksecuritysolutions.files.wordpress.com/2017/05/curata__nu616jlqf8ogtkb.jpeg

Don’t Sit Back and Wait for Security Risks to Disappear

Risk management is the essence of what we do as information security professionals. We identify key security risks and analyze those risks in the context of the business. We then communicate the confirmed or potential outcomes to management. Finally, we decide — or wait for decisions — on how to respond. Many security challenges begin at this step.

Read the source article at Security Intelligence
http://retailnetworksecuritysolutions.files.wordpress.com/2017/05/curata__0n33oqi4mscvqqt.jpeg

10 ways cyber security will evolve in the face of growing threats

Information Age identifies ten ways cyber security will evolve over the next five years, as threats like ransomware continue to spread ‘Over the next five years, there will be an ever-growing urge across the tech industry to leverage the IoT for anything from automating data collection to programming manual actions in the physical world’ The cyber threat landscape is constantly evolving, with different strains of malware attacking network systems every day.

Read the source article at information-age.com
None

4 Cybersecurity Best Practices to Bolster Small Business Defenses – National Cyber Security Ventures | Hacker News

As cybervillains intensify efforts to crack into your networks and devices, here’s how to keep your data safe. Through its exercise videos and nutritional shakes and supplements, Beachbody helps people get buff, lose weight and live healthier lives. In fact, the fitness company’s IT team knows all about working up a sweat, but in their case, it’s to add muscle to the company’s cybersecurity defenses.

Read the source article at National Cyber Secuirty University
http://retailanditconsulting.com/wp-content/uploads/2017/05/curata__yigjpwkbo0zwmhk.jpeg

Once Stolen, What Do Hackers Do With You Data?

It’s a common question: What happens to your data after a hacker steals it? Understanding the nuts and bolts of an attacker’s post-hack routine is not only interesting, but it could also help you minimize the damage if your data is stolen. (Note that the following information is a general overview of the most common steps […]

Read More – Once Stolen, What Do Hackers Do With You Data?

Read the source article at Secplicity
http://retailnetworksecuritysolutions.files.wordpress.com/2017/05/curata__qyamqr2rcf18erf.jpeg

The cyber security remedy: prevention is better than a cure

Wonga’s recent announcement that it was hit by a data breach affecting 245,000 of its UK customers is yet another sharp wakeup call for businesses. All available information concerning the attack indicates that this could be one of the biggest financial information leaks the country has ever seen. Businesses across Britain are waking up to the fact that it is a case of “when” not “if” they will be targeted. Just look at what has happened to NHS, TalkTalk… the list goes on and on and on.

Read the source article at information-age.com
None

Cyber-crime targets: No company is too small

Cyber security is arguably the most challenging issue facing companies today. According to a new governmental report on cyber security breaches for 2017, businesses are increasingly looking to websites, social media pages and the use of cloud services, meaning that companies need to ensure these platforms and services are kept secure and managed effectively.

Read the source article at ITProPortal
http://retailnetworksecuritysolutions.files.wordpress.com/2017/05/curata__w7zgwnhbl43zsv1.jpeg

Reasons Managed Security Services Are Crucial to Your Business – DZone Security

Technology is evolving at a constant pace and so are the skills of online hacktivists. Hackers are constantly active, trying to find chinks in your security systems to steal and misuse your crucial data. The Global Economic Crime Survey by PwC reveals that cybercrime has climbed to the second most reported economic crime, impacting 32% of organizations. According to Forbes, cybercrime costs will reach $2 trillion by 2019.

Read the source article at dzone.com
http://retailnetworksecuritysolutions.files.wordpress.com/2017/05/curata__efonqgjd3ns3ytc.jpeg

Outsourcing security: Would you turn over the keys to a third party?

Managed security services providers are gaining a foothold in the market. Years ago it would have been unthinkable to give up control to securing your most valuable assets. But for some companies the risk of handing the security keys to a third party is less than the idea of facing the daily barrage of attacks. When asked why a company would cede control, many vendors said it depends on the level of staffing that company has. If the expertise is lacking, why take the chance.

Read the source article at Welcome to Network World.com
http://retailnetworksecuritysolutions.files.wordpress.com/2017/05/curata__f4lpwcycgqgwfui.jpeg

How to improve cyber security awareness in your organisation | IT Security

Training, providing secure devices & delivering a cultural change are ways CIOs can raise awareness of security in the workplace Cyber security remains an ongoing issue for CIOs and businesses today. According to The Culture, Media and Sport Committee, 25% of companies experience a security breach at least once a month, with the problem continuing to grow. An increasing number of CIOs are exploring new ways to protect customers and employees from online threats.

Read the source article at Tech and IT Business Opinion, Interviews
http://retailnetworksecuritysolutions.files.wordpress.com/2017/05/curata__h1umtl39gexvfah.jpeg

How can Welsh Businesses Protect Themselves from Future Cyber Attacks?

Business News Wales asks businesses in Wales; How can Welsh businesses ensure they are protected from any future Cyber Attacks? Basic Cyber Security should start with a risk assessment to define which assets a business needs to protect. The Queen does not leave the crown jewels on the lawn outside the palace for obvious reasons!

Read the source article at Business News Wales
http://retailnetworksecuritysolutions.files.wordpress.com/2017/05/curata__vczhwrxpcbztm6q.jpeg

Evolving Cyber Threats Require Evolving Training – ISACA Now

Today’s cyber security professional is an amalgamation of haphazard professional experience, rapid-fire bootcamps, and smatterings of dynamically defined academic programs. This has created a vibrant field, full of individuals with creative takes on issues and unconventional approaches to problems that are difficult to predict. However, as the field matures and the online attackers ratchet up their skill sets, the traditional solution becomes less effective.

Read the source article at Information Technology
http://retailnetworksecuritysolutions.files.wordpress.com/2017/05/curata__uuxrjo6z0hgolm6.jpeg

WannaCry Ransomware Shows Why Software Updates Are Important

We’ve all been guilty of it. You’re cramming to hit a deadline, and you dismiss that tiny notification in the corner of your screen reminding you to install a new software update. But if there’s anything to be learned from the global ransomware attack that’s plagued computers in 150 countries, it’s that these updates are as crucial as ever. “This whole disaster could have been prevented if people had patched their system,” says Jerome Segura, a security researcher for software firm Malwarebytes.

Read the source article at time.com
http://retailnetworksecuritysolutions.files.wordpress.com/2017/05/curata__iddxj25tavhgkkf.jpeg

WannaCry ransomware prompts legacy MS17-010 patch

Microsoft responds to WannaCry ransomware with an MS17-010 patch for legacy systems as new ransomware variants spread to more countries around the globe. WannaCry ransomware exploded over the weekend and spread like a worm to infect more than 200,000 systems across 150 countries around the world, according to Europol. In response, Microsoft took the emergency step to release patches for no longer supported versions of Windows.

Read the source article at searchsecurity.techtarget.com
http://retailnetworksecuritysolutions.files.wordpress.com/2017/05/curata__vszyazivfvjbcjo.png

Global Ransomware Attack: What Your Organization Needs to Know Now

Beginning on Friday, May 12, 2017, organizations across the world were hit by a cyberattack called WannaCry. This malware—a type of ransomware—operates by encrypting an organization’s data and demanding a Bitcoin payment (nearly $300 per attack) before it will restore the affected files. So far approximately 200,000 computers in over 150 countries have been impacted, making this the largest international ransomware attack to date.

Read the source article at National Law Review
http://retailnetworksecuritysolutions.files.wordpress.com/2017/05/curata__1omwpcppz0rzzv5.jpeg

Third parties leave your network open to attacks

Most businesses hire third-party providers to fill in when they lack in-house resources. It is often necessary to allow third-party vendors access to their network. But after Target’s network was breached a few years ago because of an HVAC vendor’s lack of security, the focus continues to be on how to allow third parties access to the network without creating a security hole. The use of third-party providers is widespread, as are breaches associated with them.

Read the source article at CIO.com
http://retailnetworksecuritysolutions.files.wordpress.com/2017/05/curata__keqfyw0xwjridwp1.jpeg

Cyber-Security: It’s Time To Make Security A Priority – A Blog About IT & Security. The Social Network For Your Network

Security is no longer just a problem for a few individuals but rather a problem involving more and more people, and it should occupy an important part in our lives. Security is still the top player in IT priorities and will continue to be. What we can learn from the recent series of cyberattacks last week, is that the seizure of information stored by users and companies on various platforms has become one of the most important trends.

Read the source article at multiven.net
http://retailnetworksecuritysolutions.files.wordpress.com/2017/05/curata__yjrqgzpjmcncnav.jpeg

‘Perfect storm’ of conditions helped cyberattack succeed

NEW YORK — The cyberextortion attack hitting dozens of countries spread quickly and widely thanks to an unusual confluence of factors: a known and highly dangerous security hole in Microsoft Windows, tardy users who didn’t apply Microsoft’s March software fix, and a software design that allowed the malware to spread quickly once inside university, business and government networks.

Read the source article at StarTribune.com
http://retailnetworksecuritysolutions.files.wordpress.com/2017/05/curata__t7pznavxe9iq7fw1.png

Where the global cyberattack has hit hardest

NEW YORK — Here is a look at some of the places hit by the global cyberattack.

EUROPEAN UNION — Europol’s European Cybercrime Centre, known as EC3, said the attack “is at an unprecedented level and will require a complex international investigation to identify the culprits.”

Read the source article at StarTribune.com
http://retailnetworksecuritysolutions.files.wordpress.com/2017/05/curata__t7pznavxe9iq7fw.png

Get Started: Keep your company’s data safe from cyberattack

Small business owners are getting a reminder about the need for cybersecurity from the worldwide “ransomware” attack on computers.

The attack, which has hit companies, schools, government agencies and hospitals, has put company owners on notice that their businesses could be vulnerable to the invasive software that often arrives by email, locks up the files on a PC or server and renders them useless.

Read the source article at StarTribune.com
http://retailnetworksecuritysolutions.files.wordpress.com/2017/05/curata__wosbedxnhpm4yze2.png

The Latest: More US firms believed hit by cyberattack

NEW YORK — The latest on the global extortion cyberattack that hit dozens of countries (all times local):

A law enforcement official says investigators believe additional companies in the United States have been affected by the global “ransomware” software cyberattack but have not yet come forward to report the attacks.

The official spoke to The Associated Press on condition of anonymity because the official was not authorized to speak publicly about an ongoing investigation.

Read the source article at StarTribune.com
http://retailnetworksecuritysolutions.files.wordpress.com/2017/05/curata__wosbedxnhpm4yze1.png

The blame game, ransomware edition: Who’s at fault?

NEW YORK — From governments to individuals, there’s plenty of finger-pointing going on following the latest global cyberattack.

Who’s being targeted for blame? There’s Microsoft, whose ubiquitous Windows operating systems were compromised after attackers exploited a security hole.

Then there’s the U.S. government, whose Windows hacking tools were leaked to the internet and got into the hands of cybercriminals.

Read the source article at StarTribune.com
http://retailnetworksecuritysolutions.files.wordpress.com/2017/05/curata__wosbedxnhpm4yze.png

Third parties leave your network open to attacks

Most businesses hire third-party providers to fill in when they lack in-house resources. It is often necessary to allow third-party vendors access to their network. But after Target’s network was breached a few years ago because of an HVAC vendor’s lack of security, the focus continues to be on how to allow third parties access to the network without creating a security hole. The use of third-party providers is widespread, as are breaches associated with them.

Read the source article at itworld.com
http://retailnetworksecuritysolutions.files.wordpress.com/2017/05/curata__keqfyw0xwjridwp.jpeg

Proactive approach needed for cyber security: report

This is according to a report released by global technology association CompTIA. The report, titled The Evolution of Security Skills, states companies need to adopt various proactive measures to identify weak links before they are exploited; broaden the security skills of their technology professionals, as well as to implement top to bottom security training throughout the organisation.

Read the source article at itweb.co.za
http://retailnetworksecuritysolutions.files.wordpress.com/2017/05/curata__zre7ktzmmxttdjc.jpeg

How to Evaluate Your Security System’s Cyber Risk | 2017-04

Whether it’s an HVAC system, a point-of-sale terminal or a video surveillance camera, malicious attackers are looking for any way into your network and closer to your valuable data, systems and intellectual property. While enterprises are working to shore up the weak links of their cybersecurity systems, it’s necessary to take a close look at the cyber risks your own physical security system may bring to the enterprise.

Read the source article at Security Magazine
http://retailnetworksecuritysolutions.files.wordpress.com/2017/05/curata__vbqotgfknoboedd.jpeg

The five steps for managing cyber security threats

Cyber security is a people problem more than a technology problem. A single compromised employee, whether malicious or negligent, can render the best systems worthless. Although the media loves a shady computer hacker story — usually adorned with images of a man in a hoodie sitting in a dark room — the reality is that rogue employees can often do much more damage to an organisation’s data integrity.

Read the source article at Public sector news, government learning
http://retailnetworksecuritysolutions.files.wordpress.com/2017/05/curata__ap6xbmeeazdjuyv.jpeg

Ransomware And Retail

Imagine turning on your smartphone and finding that it has been completely locked out by a stranger demanding payment, a cybercriminal. If you have ever lost access to your phone for other reasons, you know the frustration of not being able to get to your contacts, emails, calendar or any communication convenience. Now imagine this frustration applied to your entire retail operation — blocking all transactions and disrupting your connection to the customer.

Read the source article at Retail TouchPoints
http://retailnetworksecuritysolutions.files.wordpress.com/2017/05/curata__a8fpjtscdbvheos.jpeg

3 Essential Cybersecurity Tips for Small Businesses

In fact, being able to translate brand values to an online audience has never been more essential for businesses looking to keep up with the competition. This shift towards digital technologies also presents a new set of challenges for companies of all sizes, none more so than cybersecurity. As the online marketplace increases in size, so does the propensity for online scams.

Read the source article at Frugal Entrepreneur
http://retailnetworksecuritysolutions.files.wordpress.com/2017/05/curata__f6usmcsztimb2wu.jpeg

Cybersecurity Attacks Hit 87% of Organizations in 2016

April 12, 2017 – A majority of organizations reported that they were affected by a cybersecurity attack last year, with one in three saying that they had been hacked more than five times in the past 12 months, according to a recent Bitglass report. In response, 52 percent of respondents also said that their entity planned to increase their overall security budgets.

Read the source article at healthitsecurity.com
http://retailnetworksecuritysolutions.files.wordpress.com/2017/05/curata__u2yd6my13rrysrl.gif

Four Cybersecurity Trends That Every Retailer Needs to Know

Call it optimism or just human nature — retailers, like most people, don’t like to spend a lot of time thinking about unseen threats. A series of painful breaches a few years ago forced the industry to wake up to the dangers of cyber crime and implement new measures to address and control online risks, leading to industrywide security gains.

Read the source article at Total Retail
http://retailnetworksecuritysolutions.files.wordpress.com/2017/05/curata__tsnn0vo7douvfyt.jpeg

Government: Half of UK Firms Hit by Cyber-Attack

Nearly half (46%) of UK firms experienced a breach or cyber-attack last year, with many still failing to implement basic, formalized security despite spending money on threat defence, according to a new government report. The Cyber Security Breaches Survey 2017 was commissioned by the Department for Culture, Media and Sport (DCMS) as part of the National Cyber Security Programme, and is based on interviews with over 1,500 businesses.

Read the source article at Infosecurity Magazine
http://retailanditconsulting.com/wp-content/uploads/2017/05/curata__oelalykdcngjdci.jpeg

Why an accountant is a cybercriminal’s favourite target

Justin Dolly of Malwarebytes looks at what accountants can do to protect their data and minimise cybersecurity risks. When most people think of a data breach, they often think of hospitals, retailers or even banks being victimised. But what about accounting firms? Think about it – everyone trusts you with their personally identifiable information.

Read the source article at Accountancy Age
http://retailanditconsulting.com/wp-content/uploads/2017/05/curata__iog4ndc5qtxvezi.jpeg

IT security as a business issue: how great security helps you grow

Studies suggest that in 2016, hackers stole an estimated $1 billion using ransomware. This translates into a cost of around £75,000 per small business. Without a doubt, the need for robust IT security has never been greater. There are many simple ways to improve your security posture: firewalls, external servers and cloud back-ups can stop hackers in their tracks. Above all, it’s important to keep the best tools on hand as hackers techniques become more advanced.

Read the source article at pensar.co.uk
None

26,000 Debenhams Customers Breached

A cyber-attack has compromised the personal data of up to 26,000 Debenhams customers. The breach, which is understood to have been malware-based, targeted the online portal for the retailer’s florist arm, Debenhams Flowers. IT security experts from Cylance, Imperva and Kaspersky Lab commented below. Anton Grashion, Managing Director Security Practice at Ajay Uggirala, Director at “Our experience show that 100% of businesses are under attack.

Read the source article at home – Information Security Buzz
http://retailnetworksecuritysolutions.files.wordpress.com/2017/05/curata__rnlfvxedarsikg0.jpeg

Why Physical Security For Your Business Is Just as Critical as Online Security

For most people involved in running an online business, implementing stringent security practices has become second nature. It’s easy to see why: Not only do technologies such as SSL and encryption keep your company’s data secure, but the sight of that little green padlock in a browser’s address bar gives your customers confidence that they’re dealing with a legitimate business.

Read the source article at Entrepreneur
http://retailanditconsulting.com/wp-content/uploads/2017/05/curata__hhcmqjw8aqj7a9a.jpeg

How Your Business is Being Hacked and How to Stop It

60% of small companies that suffer a cyber attack or breach are out of business within six months, according to data from the National Cyber Security Alliance. Small businesses that previously escaped the attention of cyber criminals are now increasingly targeted by these catastrophic attacks. If you’re an SME, cyber security is more important than ever.

Read the source article at business2community.com
http://retailnetworksecuritysolutions.files.wordpress.com/2017/05/curata__dhzdozaskbm6ntb.jpeg

IT security from the start: 3 ways to make it a business priority

One of the biggest priorities in IT this year will be to finally resolve the ongoing debate: Who is responsible for security? Is it the sole responsibility of IT, the CISO’s job, or is it a business problem? From my point of view, if you don’t think security is part of your job, you become part of the problem. To truly secure the enterprise, security must become central to everyone’s role. I like to relate this issue to driving. When you’re on the road, your job is to drive the car.

Read the source article at The Enterprisers Project
http://retailnetworksecuritysolutions.files.wordpress.com/2017/05/curata__qpbzw5ea6daswhu.png

Cybersecurity risks for small businesses are anything but small

Working in data breach resolution, I have the opportunity to assess both the emerging security risks and misconceptions haunting businesses today. Recently, I’ve heard from others in the industry – risk managers, cyber insurers and various security professionals – that many small businesses don’t believe they will be targeted by cyber-attacks.

Read the source article at Security Magazines
http://retailnetworksecuritysolutions.files.wordpress.com/2017/05/curata__olj491onomrvgic.jpeg

Is your business too complacent about cyber security?

Cyber security has never been as heavily in the public eye as it is today. But are businesses complacent about this increasingly necessary practice? Top management is committed to continuous vigilance and improving cyber security, recognising that a sound security culture – where everyone in the organisation understands the risk and knows what part they can play in keeping their organisation and stakeholders secure – is essential The results are in.

Read the source article at information-age.com
http://retailanditconsulting.com/wp-content/uploads/2017/05/curata__xph1ksm2g6hsl8f.jpeg

3 Barriers to Cybersecurity Success and How to Overcome Them

2016 was a record year for data loss with reported breaches exposing almost 4.3 billion records. While the reported number of incidents has not increased year over year, the average breach was more severe – and exposed more records – than in previous years. You only need to look at the number of compromised records at three breaches in 2016 to see examples of the severity: Yahoo, FriendFinder and MySpace.

Read the source article at Home – CenturyLink Bright Ideas
http://retailnetworksecuritysolutions.files.wordpress.com/2017/04/curata__ajtuovubi1ggfqi.jpeg

How your company needs to train workers in cybersecurity

With workplace cyberattacks on the rise, industry experts are pressing businesses to train their workers to be more vigilant than ever to protect passwords and sensitive data and to recognize threats. “It is imperative for organizations of all sizes to instill among employees the critical role they play in keeping their workplace safe and secure,” said Michael Kaiser, executive director of the National Cyber Security Alliance, a group that promotes education on the safe and secure use of the internet. The group’s members include such major technology companies as Cisco, Facebook, Google, Intel and Microsoft. Kaiser made his comments …

Read the source article at computerworld.com
http://retailanditconsulting.com/wp-content/uploads/2017/04/curata__jrcoikowx42rxca.jpeg

Plan, prepare and be secure: a guide to cyber security

These days pretty much all businesses use computers in some way or another. If yours is one of them, then you need to think about cyber security. It’s a term which we’ve all heard about, but which very few of us actually see as a direct risk to ourselves or our businesses. Some people find it very rare to be impacted at all, as their habits or their obscurity keep them safe.

Read the source article at SME Magazine
http://retailanditconsulting.com/wp-content/uploads/2017/04/curata__9bnb6xxhtr4dhv9.jpeg

4 Reasons Why Clouds May Be More Secure Than Your Small Business Computer System

Choosing cloud as the term for a system that stores data may have been an unfortunate misnomer. With regular news stories about hacking, it is difficult to envision a world where data floating around in the sky could ever be secure. In a nutshell, cloud computing refers to services that are delivered over the internet. If involvement by the hacker-prone internet fails to help you sleep at night, then it’s time to learn more about the magic of the cloud.

Read the source article at Microsoft Enterprise
http://retailanditconsulting.com/wp-content/uploads/2017/04/curata__8yareawbncergys.png

Top 10 data security tips for small business

Every year for USA TODAY, I write an annual top trends in business column to start the year. For the past few years, there has been one issue that has made my Top 5 consistently, and it wasn’t mobile, social media, or technology. Yes, the issue is that big and the stakes are that high.

Read the source article at blogs.business.microsoft.com
http://retailnetworksecuritysolutions.files.wordpress.com/2017/04/curata__t9pr6feyswyejfi.png

Making cyber security your business, and your firm cyber secure

Stephen Franklyn of Lithium Systems discusses why accountancy firms should prioritise cyber security and how they can take steps to protect both data and their reputation. As we now live in a world of information technology, the risk to our business critical data continues to increase at an alarming rate, yet many business have only the vaguest concept of what cyber security is and what it means for them. The harsh reality is that all businesses are faced with threats on a daily basis.

Read the source article at Accountancy Age
http://retailnetworksecuritysolutions.files.wordpress.com/2017/04/curata__1vwtuh4pkxpc2zw.jpeg

The IoT Impact on Businesses

The Internet of Things (IoT), in which all manner of devices and things are connected, is enabling digital transformation in many walks of life. It’s also heralding the promise that we will soon live in hyperefficient smart cities. But how does this affect business? A recent report from The Economist Intelligence Unit (EIU) gauged the current IoT impact on business in comparison to similar research the firm conducted in 2013.

Read the source article at Security Intelligence
http://retailnetworksecuritysolutions.files.wordpress.com/2017/04/curata__yqfwr7hsrlaqiti.jpeg

How to Protect Yourself and Your Business from Online Criminals

Today’s online criminals have the ability to move faster and more covertly than ever before. They’re out to get you, and they’re exploiting every vulnerability. Whether you’re a business owner or a consumer, here are four ways to protect yourself. Related: 6 Security Measures Every Startup Should Take in 2017 Fraud has moved online. Back in 2015, the U.S. started using EMV microchip cards.

Read the source article at Entrepreneur
http://retailnetworksecuritysolutions.files.wordpress.com/2017/04/curata__goo8wmwambrabr4.jpeg

UK businesses and cyber security One in five businesses suffered attack in 2016

LONDON, U.K. – In its latest survey, the British Chambers of Commerce (BCC) found just how prone British businesses are to cyber attacks. According to the survey conducted by the body, one in five businesses in the U.K. has been the victim of an attack within the last year. Revealing the findings of the survey, BCC urged organisations in the country to improve their cyber security provisions.

Read the source article at Big News Network.com
http://retailnetworksecuritysolutions.files.wordpress.com/2017/04/curata__i1txbgmkbsd7sz1.jpeg

Why Adaptive Crimes Are a Threat to Your Business—and Customers | Dealer Marketing

While you’re reading this, adaptive cyber criminals may be targeting your dealership and your customers—to steal your money and their identities. Today’s cyber thieves and hackers seem to remain one step ahead of security systems and theft deterrent tools, but that’s changing. That’s good news for any retailer, including auto dealerships. Cyber crimes are adaptive crimes.

Read the source article at Dealer Marketing
http://retailnetworksecuritysolutions.files.wordpress.com/2017/04/curata__ir8zprsvl2csoan.gif

Cybersecurity Essentials to Protect Your Small Business from Hackers

American Small businesses are becoming one of the top targets for global hackers. While a solid deadbolt on the front door and a set of security cameras scoping out the parking lot are still sensible ways to keep your place of business safe and secure, there are a lot more potential security issues lurking in your unassuming laptop or WiFi router than in the physical building itself, and they deserve every business owner’s serious attention.

Read the source article at business2community.com
None

8 Cyber Security Tips for Small Business

Today, cyber security tips for small businesses should not be taken lightly. If you are like millions of small-business owners in America, you probably cannot imagine how a cyber criminal halfway around the world could possibly cause your business to suffer a data security breach. After all, aren’t hackers busy enough with the Fortune 500? Surprise!

Read the source article at IT Services Philadelphia
http://retailnetworksecuritysolutions.files.wordpress.com/2017/04/curata__45aoxtpwmrf3hdi.jpeg

Intercontinental Hotels Suffer Major Card Breach

The Intercontinental Hotels Group (IHG) has been forced to reveal yet another major data breach of customer card details over the latter part of 2016. In a lengthy missive on Friday, the group explained that an unspecified number of IHG hotels run as franchises were affected between September 29 and December 29 last year.

Read the source article at Infosecurity Magazine
http://retailnetworksecuritysolutions.files.wordpress.com/2017/04/curata__ezxkytoslogg3sy.jpeg

Cisco UK & Ireland Blog » 5 Reasons Retailers are Top of the Hacker Hit-list

Retail sales may be under threat in the UK as consumer confidence wavers, but the prospects of hitting the shops has never been so appealing. With cyber-criminals, that is. The retail industry is a top target for cyber-attacks, and the hackers are more than keeping pace with digitisation.

Read the source article at Cisco Global Blogs
http://retailnetworksecuritysolutions.files.wordpress.com/2017/04/curata__focqx2i0rvwqnfm.jpeg

IT Security Training White Paper: 10 Network Security Tools and Tests Everyone Should Use

Whether you are operating a home system, overseeing a small startup, or performing security governance for an enterprise, everyone can benefit from paying attention to security. This paper provides a list of 10 security tools or tests that will help you check out suspicious issues and keep ahead of new risks and threats. At this point, everyone should be aware that security management is essential for everyone.

Read the source article at Global Knowledge
None

Neiman Marcus: 2015 Breach Exposed Full Card Details

Hackers aren’t giving luxury retailer Neiman Marcus Group a break. See Also: 2017 Predictions on Data Security: Insights on Important Trends in Security for the Banking Industry On April 14, the company disclosed to the California attorney general that a December 2015 breach compromised more sensitive information than first thought.

Read the source article at bankinfosecurity.com
http://retailnetworksecuritysolutions.files.wordpress.com/2017/04/curata__4kfbbwhkuqjdwo3.jpeg

A New Wave of IoT Security Threats Are Coming — Here’s How to Mitigate Them

The Internet of Things poses a cybersecurity challenge for many companies, but there are practical steps IT and business leaders can take to diminish the threat. The Mirai botnet that took down the domain name system provider Dyn in a massive distributed denial of service attack last fall awakened the world to the vulnerability of Internet of Things devices.

Read the source article at biztechmagazine.com
http://retailnetworksecuritysolutions.files.wordpress.com/2017/04/curata__vbmq4ceelvxtasq.jpeg

CenturyLinkVoice: 3 Barriers To Cybersecurity Success And How To Overcome Them

2016 was a record year for data loss with reported breaches exposing almost 4.3 billion records. While the reported number of incidents has not increased year over year, the average breach was more severe – and exposed more records – than in previous years. You only need to look at the number of compromised records at three breaches in 2016 to see examples of the severity: Yahoo, FriendFinder and MySpace.

Read the source article at Forbes Welcome
http://retailnetworksecuritysolutions.files.wordpress.com/2017/04/curata__fnbxrpyttnrqfme.jpeg

Creating a Culture of Security in Your Organization – Research Blog

Your organization may say it’s committed to security, but allowing employees to bring their own devices (BYOD) or unsecured laptops leaves the door wide open to catastrophic data loss. According to the 2016 Ponemon Cost of Data Breach Study, the average consolidated total cost of a data breach jumped from $3.8 million to $4 million. But what are the chances your organization will actually be affected?

Read the source article at indusface.com
http://retailnetworksecuritysolutions.files.wordpress.com/2017/04/curata__tdjbml1kudqvrdt.png

The Biggest Risk to Your Cyber Security Is Your Company

Digital security can no longer be ignored by busiensses. Companies and organisations that fail to identify the most common, significant and serious security concerns or threats are far more likely to be targeted by malicious users or suffer a breach.

Read the source article at Acumin Recruitment & Consulting
http://retailnetworksecuritysolutions.files.wordpress.com/2017/04/curata__pmi3julltlsvtxs.jpeg

5 Consequences That Result From Not Meeting Data Security Requirements

As more businesses start to enhance their user experience, platforms, and products with personal data, data security becomes more important for consumers and business owners. While it might seem tedious, there are laws and systems in place to make sure that company’s play ball when it comes to the protection of personal information, but there are still business owners who fail to meet the stipulated requirements.

Read the source article at dzone.com
http://retailnetworksecuritysolutions.files.wordpress.com/2017/04/curata__cxyho1x01xydo8d.jpeg

How to fend off cyberattacks and data breaches

Experts in online security and data protection explain how smaller businesses can prevent security breaches and digital attacks. According to research conducted by Symantec, the number of cyberattacks against small businesses (companies with fewer than 250 employees) has been steadily growing over the last six years, with hackers specifically targeting employees (phishing).

Read the source article at CIO.com
http://retailnetworksecuritysolutions.files.wordpress.com/2017/04/curata__bzcezgpgixi8nqm.jpeg

Report: 95% of employers have employees who breach network security

Employers who want to steal data or engage in other restricted behavior will do so once they find a way. Policies and enforcement procedures must be in place, but if workers are intent on finding ways to break through security systems, there’s a sure bet they’ll attempt to find ways around HR’s ground rules.

Read the source article at HR News and Analysis
http://retailnetworksecuritysolutions.files.wordpress.com/2017/04/curata__p6sbxk2iwt6c9j2.jpeg

SecurityMetrics 2017 PCI Guide Simplifies PCI Compliance Process

/PRNewswire/ — Many businesses still struggle with PCI compliance, making them vulnerable to data attacks. According to SecurityMetrics’ latest forensic data, the average merchant, at the time of data compromise, wasn’t compliant with at least 47% of PCI DSS requirements. The SecurityMetrics 2017 Guide to PCI DSS compliance demonstrates recent forensic data to show where many businesses are not compliant.

Read the source article at PR Newswire
http://retailnetworksecuritysolutions.files.wordpress.com/2017/04/curata__odsoxqp4ahb3zko.jpeg

How To Make Customers And Employees Feel Safe

As a business owner, you’re responsible for the safety of your employees and patrons. Ask yourself: Do your customers and workers feel physically secure when they’re in your store? Do your patrons feel confident using their credit cards? To run a successful business, you need to be able to answer “yes” to these questions without hesitation. If you think your store could use some help in these areas, consider implementing the ideas below.

Read the source article at home – Information Security Buzz
http://retailnetworksecuritysolutions.files.wordpress.com/2017/04/curata__rsbgbdlarumtry5.jpeg

Insights from a PCI Forensic Investigator

At the PCI Acquirer Forum in Las Vegas on 9 May, PCI Forensic Investigator (PFI) Tom Arnold, Payment Software Company, will share with acquirers and processors insights and recommendations from recent data breach investigations. Ahead of his presentation, he discusses some of the challenges he sees in payment security and what keeps him awake at night.

What role do you play in merchant payment security as a PFI?

Read the source article at PCI Perspectives
http://retailnetworksecuritysolutions.files.wordpress.com/2017/04/curata__vk885qahhrgyxu2.jpeg

Defending against ransomware attacks in the payment card industry – IT Governance Blog

Ransomware is currently the biggest cyber security concern for many businesses, and the danger of an attack is continuing to grow. There has been a 600% growth in new ransomware families since December 2015, according to a recent Payment Card Industry Security Standards Council (PCI SSC) guide, which also reported that ransomware crime cost businesses an estimated $1 billion (approximately £800 million) last year.

Read the source article at IT Governance
http://retailnetworksecuritysolutions.files.wordpress.com/2017/04/curata__qlugqzs6zevmg1y.jpeg

Point of Sale Hacking and What it Means for Small Businesses

While many business owners purchase point of sale machines with the belief that they are secure, this is often far from the truth. POS, or Point of Sale, hacking is the process of stealing data such as credit card information using remote attacks and malware. More importantly, hundreds of thousands of point of sale hacks happen every year, and some affect thousands of businesses at once.

Read the source article at Threat Sketch
http://retailnetworksecuritysolutions.files.wordpress.com/2017/04/curata__ntf0sypf39fxjpi.jpeg

Payment Card Industry Security Compliance: What You Need to Know

A quick refresher on all the different PCI SSC security standards that are relevant for organizations that accept electronic payments. In the dynamic world of payments, transaction security is of paramount importance. When we speak with our customers and partners, the topic of payment security and Payment Card Industry (PCI) compliance always comes up. Although there is a lot of useful information about payment security available, the industry is also filled with many questions regarding PCI.

Read the source article at Dark Reading
http://retailnetworksecuritysolutions.files.wordpress.com/2017/04/curata__j6en0xarcsvpksk1.jpeg

Safety First: The Basics of Website Security for Ecommerce Retailers

For ecommerce retailers, website security is the cornerstone of a successful online business. Why? It’s simple: people only want to give their money and their business to companies and organizations that they can trust. If a retailer has an insecure website, then, all other marketing and inbound efforts simply won’t bring results.

Read the source article at HubSpot Blog Homepage
http://retailnetworksecuritysolutions.files.wordpress.com/2017/04/curata__theckr9cqp88xjz.jpeg

The Growing Threat of Data Breaches in Grocery

With every year that passes, data breaches become a bigger and more frightening threat for retailers. In 2016, nearly 1,000 cases were reported, the highest number since The Identity Theft Resource Center, in San Diego, began keeping records in 2005. And grocers are a hot place for data criminals. According to research from Chicago-based fraud protection firm Rippleshot, they make up the No. 1 channel for data breaches in terms of the percentage of compromised accounts.

Read the source article at Progressive Grocer
http://retailnetworksecuritysolutions.files.wordpress.com/2017/04/curata__y33fmrclwavptz5.jpeg

Why You Should Think of Security as a Skill, Not Just a Role

A common mistake that we see organizations make is putting off security until they hire someone who specializes in it. Depending on the size of your company and the nature of your business, this could mean waiting several years to start taking security seriously. In today’s threat environment, that’s not realistic or practical.

Read the source article at Cloud Security News, Cloud Security Blog
http://retailnetworksecuritysolutions.files.wordpress.com/2017/04/curata__n30uvdzscs9gul2.png

What every business should know about Cyber Security

The exponential growth in technological developments in recent years has led to a number of new opportunities and an increase in efficiency for businesses big and small; however, these developments have also brought about a number of threats that have not been encountered before. Cyber security, or the protection of data, networks and systems in cyberspace, will rapidly become business critical as more and more devices become part of the ‘Internet of Things’.

Read the source article at csgrp.co.uk
http://retailnetworksecuritysolutions.files.wordpress.com/2017/04/curata__iegqxepf2xdyaei.jpeg

5 Reasons You Should Be Paying Attention to Cybersecurity

In a joint Oracle and Inc. study, the leaders of the fastest-growing companies in America were surveyed about the qualities that made them personally successful, the reasons for their businesses’ success, and their plans for the immediate future. The results? It all comes down to sales, talent, and explosive growth. On the other end of the spectrum, these business leaders did not feel that “managing security” and being “tech savvy” were key factors to their success.

Read the source article at inc.com
http://retailnetworksecuritysolutions.files.wordpress.com/2017/04/curata__do4rpdw69e1dx7y.jpeg

Do you think your business is safe? Think again

Statistics show that small and mid-sized businesses are not immune to cybercrime, and as much as 50 per cent of the businesses reported to have at least one cyberattack in the last 12 months. It cost these businesses well over US$955,000 for restoration. The global cybercrime cost is expected to cross US$2 trillion by 2019.

Read the source article at Yahoo News Singapore
http://retailnetworksecuritysolutions.files.wordpress.com/2017/04/curata__riqignottwogrhj.jpeg

3 challenges to securing business data

Success in today’s fast-moving business world hinges on innovation — and data is its lifeblood. But data-driven innovation faces escalating risks from attacks types that are constantly evolving to uncover new vulnerabilities and ultimately, steal valuable data. Staying ahead of cybercriminals requires continually adapting and growing security controls and practices. Many businesses, though, aren’t heeding cybersecurity’s growing warning signs.

Read the source article at csoonline.com
http://retailnetworksecuritysolutions.files.wordpress.com/2017/04/curata__pctipn2jpp3uesa.png

10 Important Cyber Security Tips For Small Business Owners

Massive kind of cyber security breaches that shattered some top enterprises threw the topic of cyber security to the popular discussion. Though only large companies find their way to the headlines, small businesses are not free from several cyber security threats. The horrible fact remains that the impact of cyber-attack on a small business can often be devastating.

Read the source article at TG Daily
http://retailnetworksecuritysolutions.files.wordpress.com/2017/04/curata__tk87srxtxmdgeir.jpeg

Keeping Your Business Information Safe

As businesses increasingly move online, new threats to their information security have emerged. Hacker attacks and other security breaches are on the rise, and 70 percent of organizations report having been victims of a successful cyberattack in 2014. With the average cost of a corporate data breach hovering around $3.5 million, protecting critical business information is essential to the bottom line of any business.

Read the source article at TechZone360
http://retailnetworksecuritysolutions.files.wordpress.com/2017/04/curata__rqqmicwltakn5bf.jpeg

Cyber Attacks: Are you prepared?

The Management Association of the Philippines’ (M.A.P.) participants in last week’s Forum on “Cyber Resilience: A New Board Room Priority” showed that cyber security awareness is growing. More organizations, government or private, realize that their networks are vulnerable to an attack. The ICT department alone cannot handle security; every employee, with the Board leadership, have a part to play. Any organization must prepare its way and bounce back quickly to inevitable cyber attacks.

Read the source article at BusinessWorld
http://retailnetworksecuritysolutions.files.wordpress.com/2017/04/curata__nfdh4b8hmbfy0dg.jpeg

Prevention Is Key To Enterprise Security Architecture

Prevent, detect and respond are the three pillars of the enterprise security architecture. When enterprises look for the right security framework, there is a growing inclination for CISOs and security heads towards the detect and respond mechanism. Very few place ‘prevention’ at the core of their security strategy. The prevention focused security framework however is gaining prominence in recent times.

Read the source article at cxotoday.com
http://retailnetworksecuritysolutions.files.wordpress.com/2017/04/curata__am2ql9oae0pgmfs.jpeg

4 Ways Employees Enable CyberSecurity Hacks and How To Prevent It

Although you may have heard this all before, hackers are more innovative now, than ever. It’s time for a refresher. As you are well aware, your company has a lot of information and communication flowing from person to person, within and outside the organization. This flow keeps your company running, and it’s an integral part of the relationship between your business and your clients.

Read the source article at IT Solutions and Security Solutions
http://retailnetworksecuritysolutions.files.wordpress.com/2017/04/curata__10vhpfaatll9siy.jpeg

Small Businesses Continue to Believe They Aren’t at Risk for a Security Incident

I’ve been writing about security for so long now that very little surprises me – except for this: The continued reluctance of small and medium-sized businesses (SMB) to accept that they are, and will be, targets for hackers and subject to many of the same types of security risks as larger enterprises. A recent study conducted by Manta found small businesses lack basic security policies and practices, likely because the vast majority (87 percent) don’t think they are at risk of a data breach.

Read the source article at IT Business Edge
http://retailnetworksecuritysolutions.files.wordpress.com/2017/04/curata__zbhfaeulul7hdkb.png

4 Security Questions to Ask When Outsourcing IT Operations to Make Sure Your Business Isn’t at Risk

Outsourcing IT operations to managed IT services providers (MSP) is a common trend for a business looking to maintain its operational efficiency while cutting down on cost. In addition to assisting with IT infrastructure management, 38 percent of businesses that hire an MSP do so with the expectation that their business will have enhanced security and meet regulatory compliance requirements. However, it is critical to understand that “IT management” and “IT security” are not synonymous.

Read the source article at Entrepreneur
http://retailnetworksecuritysolutions.files.wordpress.com/2017/04/curata__ukje5vb2zectyno.jpeg

Signs That You’re About to Suffer a Security Breach

Do you ever get those thoughts in the back of your mind that somehow, at some point, your organization is going to experience a security breach? I know that’s the kind of stuff that tends to keep chief information security officers (CISOs) and other security leaders up at night. The thing is, much of these thoughts are just that — thoughts. Thoughts, in and of themselves, really mean nothing when it comes to security incidents and breaches.

Read the source article at Security Intelligence
http://retailnetworksecuritysolutions.files.wordpress.com/2017/04/curata__sjogk6lsbedkkpn.jpeg

Startup Security Tips 101: Don’t Become a Statistic

According to a 2016 report from Small Business Trends, 43 percent of cyberattacks target small businesses. Unfortunately, once attacked, 60 percent of them close their doors within six months. The reality is that today’s startups and smaller organizations face unprecedented security challenges. But when asked, only 14 percent classify their ability to mitigate these threats as […]

Read More – Startup Security Tips 101: Don’t Become a Statistic

Read the source article at Secplicity
http://retailnetworksecuritysolutions.files.wordpress.com/2017/04/curata__jkb3mty8v2znkan.jpeg

Key Data-Security Measures for Every Business

Data security is the biggest concern for any business from small to big as they hold lots of sensitive information. But when you consider all the essential information you store practically right from clients’ personal information to financial records, it is not quite difficult to understand why just one single breach could completely cripple your business.

Read the source article at BusinessZone
http://retailnetworksecuritysolutions.files.wordpress.com/2017/04/curata__jle58jfsbkhf0zw.jpeg

Top 7 Questions to Ask Your Vendors about Their Security Policies

Cyber security is one of the most critical issues the U.S. faces today. The threats are real, and the need is pressing. The cyber security status is unstable, especially when considering the enormous and growing scope of these threats. So, cyberspace’s dynamic nature must be acknowledged and addressed by policies that are equally dynamic. As many breaches happened previously via targeting vendors first, so there is a need to address cyber threats associated with the vendors.

Read the source article at InfoSec Resources
http://retailnetworksecuritysolutions.files.wordpress.com/2017/04/curata__yzmpv78ukshjfji.png

Top 5 Cyber Security Mistakes Corporations Make – Macate Group

There was a total of 1,093 data breaches among U.S. companies and government agencies, which is a 40% increase from 2015 according to the Identity Theft Resource Center. Out of all the different organizations, the business sector had the most data breach incidents and represented 45.2% of the total number of cyber security breaches. It’s now 2017 and if corporations want to keep up with more advanced malware and hacking techniques, they need to stop making these common cyber security mistakes.

Read the source article at Macate Group – The Future Secured
http://retailnetworksecuritysolutions.files.wordpress.com/2017/04/curata__etmubryk8ei2hj9.jpeg

Setting Up Security as a Business: 3 Best Practices for Security Execs

At the beginning of March 2017, a third-party platform launched that promises to be a bidirectional clearinghouse to improve the security industry’s approach to third-party risk management. Called CyberGRX, the company says it will dramatically alleviate what is now a manual, spreadsheet-driven process of vendors being inefficiently assessed by customers. It will allow security teams for both companies and customers to focus on protecting their respective businesses.

Read the source article at Dark Reading
http://retailnetworksecuritysolutions.files.wordpress.com/2017/04/curata__j6en0xarcsvpksk.jpeg

Security Measures Every Business Should Consider

Cyber criminals do not discriminate in any business – regardless of the size and the reputation of the business they are a potential threat to make your business a victim of fraud and hacking attacks. In fact, often the startups and the small businesses are likely to be more tempting to them because they are more susceptible and more often than not they do not have the apt security mechanisms that the bigger companies do. Having said that, hacks are becoming more and more popular worldwide.

Read the source article at Technivorz
http://retailnetworksecuritysolutions.files.wordpress.com/2017/04/curata__ls3zdimzmayfvif.jpeg

Ensuring Proper Cyber Security Measures for Small Businesses

Cyber security issues for small businesses have been showing an increasing trend in the last five to six years. In fact, small businesses are preferred targets for many cyber criminals; the reasons are obvious. Firstly, many small businesses won’t be having the resources to invest in security, especially the way big enterprises do. Secondly, there might not be trained security personnel in such small companies and the employees working there might not be too security conscious either.

Read the source article at Know about SSL and the latest threats
http://retailnetworksecuritysolutions.files.wordpress.com/2017/04/curata__lneb2lezlhlflga.jpeg

Cyber Security and a Secure Business: What You Need to Know

How safe and secure is your business? It’s a question that every business owner should ask. In the last year, half of small to medium businesses have been hacked, and the FBI recently warned that malware attacks–which deploy infected software to your devices or servers–has increased. These and other cyber security issues are critical concerns for business owners.

Read the source article at paychex.com
None

Proactive security approach: 3 tips to prevent cyber attacks

With cyber threats growing more rapidly than ever, the issue of security has been brought to the forefront of every CIO’s mind. Today, cyber crime is a billion dollar enterprise, and it’s on the rise. According to data from Arbor Networks, the number and size of cyber attacks increased by 73% in 2016. With the incidents of cyber attacks growing year over year, no organization, regardless of size or industry, is free from the risk of a data breach.

Read the source article at Arrow Magazine
http://retailnetworksecuritysolutions.files.wordpress.com/2017/04/curata__cmcvpxy7iy4vxdc.jpeg

8 Solid Cyber Security Measures for Small Businesses

The rate of cyber attacks targeting small businesses has been mounting since 2011. Symantec, the global web and system security company in its 2016 Internet Security Threat Report has showcased how cyber security issues for small businesses have increased in the recent years. A handful of reasons suggests why small businesses are aimed by hackers and cyber criminals. These are the reasons which contribute to the increasing levels of cyber security attacks against small businesses.

Read the source article at TG Daily
http://retailnetworksecuritysolutions.files.wordpress.com/2017/04/curata__rpxbudtimrfb1y2.jpeg

When Prevention Isn’t Enough: Security Best Practices for During and After a Breach

Cybersecurity threats pose challenges to organizations of all sizes, across every industry. Cyberattackers, phishing attempts, network eavesdropping, malware and many other threats jeopardize the confidentiality, integrity and availability of IT resources on a daily basis. IT leaders must clearly understand these threats and develop security controls that allow them to remain vigilant as these threats evolve in sophistication and targeting.

Read the source article at biztechmagazine.com
http://retailnetworksecuritysolutions.files.wordpress.com/2017/03/curata__rctvmjmnvfu1ygk.jpeg

4 Key Threats to Information Security this Year

Information security threats in 2017 will be more persistent and damaging than ever before. You need to be prepared for the unknown. This year could see an exponential rise in information security breaches that endanger the integrity and reputation of trusted organisations.

Read the source article at Tailored IT Services Brisbane
http://retailnetworksecuritysolutions.files.wordpress.com/2017/03/curata__lnyvwjouakkjgr6.jpeg

3 Ways to Improve Your Firm’s Cybersecurity – Read on…

Cybersecurity should be one of the biggest concerns for small businesses, but many ignore its importance. They think because they’re small and have very few customers that they’re not a target for hacks and online crimes. However, research presented by Small Biz Trends indicates that about 43 percent of all cyber attacks are aimed at small businesses, and 60 percent of businesses hit will go out of business within six months of the attack.

Read the source article at techprevue.com
http://retailnetworksecuritysolutions.files.wordpress.com/2017/03/curata__pnkfwtg9xplyhk6.jpeg

How Security Awareness Training Can Protect Small Businesses

Small businesses are progressively utilizing information technology in business processes, but aren’t doing it securely. In essence, they do not believe adversaries will target them when there several other big, profitable organizations to attack. As a result, they neglect important measures like security awareness training, which leaves their firm in the crosshairs of cyber criminals.

Read the source article at InfoSec Resources
http://retailnetworksecuritysolutions.files.wordpress.com/2017/03/curata__j12lf5gxjgghrp6.jpeg

4 information security threats that will dominate 2017

As with previous years, 2016 saw no shortage of data breaches. Looking ahead to 2017, the Information Security Forum (ISF), a global, independent information security body that focuses on cyber security and information risk management, forecasts businesses will face four key global security threats in 2017. “2016 certainly lived up to expectations,” says Steve Durbin, managing director of the ISF. “We saw all sorts of breaches that just seemed to get bigger and bigger.

Read the source article at CIO.com
http://retailnetworksecuritysolutions.files.wordpress.com/2017/03/curata__142y6bltwl3wqye.jpeg

5 Cybersecurity Tools Your Company Should Have

No business, small or large, can afford to ignore cyber security. According to a recent Verizon Data Breach Investigations Report, 60 percent of cyber-attacks target SMBs, largely because they are easier targets. Related: 4 Reasons You Need Developers With Cybersecurity Skills in All Tech Teams But you don’t have to be passive. Here are five tools and services which small and medium business can use to protect themselves.

Read the source article at Entrepreneur
http://retailnetworksecuritysolutions.files.wordpress.com/2017/03/curata__6k3rpuq5ccnjesi.jpeg

Managed Security, The Answer To Growing Cyber Threats

With the nature of cyber attacks becoming more sophisticated and complex, it’s quite difficult for organizations to keep a close watch on the activities of the cybercriminals and update themselves at the pace of hackers and disruptors. Considering the several limitations, enterprises today intend to completely outsource the security to the third party managed service providers and free themselves from the headache of designing security architecture and framing security policies.

Read the source article at cxotoday.com
http://retailnetworksecuritysolutions.files.wordpress.com/2017/03/curata__19gsqiratls4wh7.jpeg

Cox BusinessVoice: The 5 Cybersecurity Questions Every Business Leader Should Be Asking

Think cybersecurity isn’t an issue for your business? Think again. Every company, no matter how large or small, offers potential hackers a wealth of data and assets to steal. Here are five questions about cybersecurity you should ask today to help protect your company’s data, assets, and network. Your cybersecurity suite should include basic firewall and identity protection; constant monitoring of your system for problems; anti-malware, -virus, and -spyware solutions; automatic patches.

Read the source article at Forbes Welcome
http://retailnetworksecuritysolutions.files.wordpress.com/2017/03/curata__eyn1njmrsiupepo.jpeg

The Best Tools to Improve Your Company’s Security – Research Blog

Anyone can get hacked. Individuals, brands, Fortune 500 companies, startups… hackers don’t discriminate. It doesn’t matter who you are either. Whether you’re an entrepreneur just starting out, an IT manager, an established business owner, a CIO, a director of security, a CTO, or something in between, you have to be concerned about the digital security of your company. It’s paramount in 2017. You need only look at the number of high-profile hacks and data leaks to understand why.

Read the source article at indusface.com
http://retailnetworksecuritysolutions.files.wordpress.com/2017/03/curata__9xyahjtbbixrxtq.png

What Cyber Security Risk Concerns You Most?

When it comes to effective cyber security risk management, knowing what can hurt your organization is key. In today’s world of complex threats, most organizations have made great efforts to protect customer data and business information. However, many executives my find themselves making complicated decisions that trade-off between managing risk and keeping up with business demands.

Read the source article at CompliancePoint
http://retailnetworksecuritysolutions.files.wordpress.com/2017/03/curata__xjiphybrd7dtkht.jpeg

Does the Internet of Things lead to the Hack of All Things? | IT Business Blog

Knowing a bit about technology, passwords and security, I assumed my electronic devices are pretty safe from hacking. After attending the Conference Board of Canada’s conference on cyber security last week, I’m no longer sure. There were a number of interesting insights shared, such as the data in your car is worth three times the value of the car.

Read the source article at IT Business Canada
http://retailnetworksecuritysolutions.files.wordpress.com/2017/03/curata__nmfkkq42idxzhgu.jpeg

The Sweet Spot between ‘Compliant’ and ‘Secure’

Proofpoint recently joined a group of security leaders at the World Cybersecurity Congress in London, UK. The main topic of conversation? Regulation. Security and IT professionals are increasingly concerned that the recent uptick in compliance requirements, such as the EU General Data Protection Regulation (EU GDPR), could negatively affect security programs. But complying with regulations and implementing cybersecurity best practices don’t have to be at odds.

Read the source article at proofpoint.com
http://retailnetworksecuritysolutions.files.wordpress.com/2017/03/curata__qww7bla9rwpimo0.jpeg

5 Cyber Security Measures Every Startup Must Take

Cyber criminals find small businesses and startups more appealing because they are more vulnerable and prone to a security breach. Generally, they do not have the appropriate security tools, methods and security protocols in place like other bigger companies. In 2017, the number of data breach incidents reported in the U.S. are up over 700% more than the numbers recorded in 2005.

Read the source article at Fortify Experts
http://retailnetworksecuritysolutions.files.wordpress.com/2017/03/curata__ahc7aqqccvuipf8.jpeg

Cybersecurity: 5 basic lessons for everyone

Recently we’ve had the opportunity  – quite a fun and interesting opportunity – to visit a number of information security and cybersecurity conferences. These conferences were flooded with relatively ‘new’ developments such as NextGen, the Internet of Things (IoT), IoT DDoS attacks, security intelligence platform, etc.

Read the source article at WeLiveSecurity
http://retailnetworksecuritysolutions.files.wordpress.com/2017/03/curata__bkizzr9s7x6cuyh.jpeg

CyberUK 2017: Internet of Things poses a threat to businesses

UK security leaders have called for tough action to tackle the rising threats posed by the Internet of Things through increased security on connected devices. The calls come as the recently launched National Cyber Security Centre (NCSC) hosted its first annual CyberUK conference and unveiled research warning that hackers are targeting wearable devices, voice-activated gadgets and the Internet of Things (IoT).

Read the source article at The Commentator
http://retailnetworksecuritysolutions.files.wordpress.com/2017/03/curata__pdvjcsmyudnyo2k.png

3 overlooked endpoints for cyber attacks and how to protect them

You probably think you have endpoint security covered. After all, organizations have been securing end-user desktop and laptop computers for decades with anti-virus software and other cyber security programs. Because of these steps, you think you’re not at risk of an endpoint-initiated attack. However, NTT Security’s 2015 Global Threat Intelligence Report found that 70 percent of the top vulnerabilities reside within user systems, making the endpoint the most common starting point for breaches.

Read the source article at blog.trendmicro.com
http://retailnetworksecuritysolutions.files.wordpress.com/2017/03/curata__rrfsy33ibd04urv.jpeg

Hackers’ delight: Businesses put selves at risk for invasion

NEW YORK — Randell Heath isn’t sure how hackers got into his company’s website — all he knows is a supplier called, saying the site had become an online store selling Viagra and Cialis.

The problem might have been at the company that hosts the site. It might have been that Heath’s passwords weren’t strong enough.

Read the source article at StarTribune.com
http://retailnetworksecuritysolutions.files.wordpress.com/2017/03/curata__vvq19m4pjudibyg.png

Cybersecurity vs. Network Security vs. Information Security

We are in a time where businesses are more digitally advanced than ever, and as technology improves, organizations’ security postures must be enhanced as well. Failure to do so could result in a costly data breach, as we’ve seen happen with many businesses. Threat actors are going after any type of organization, so in order to protect your business’s data, money and reputation, it is critical that you invest in an advanced security system.

Read the source article at secureworks.com
http://retailnetworksecuritysolutions.files.wordpress.com/2017/03/curata__3lbaeqxnravgdda.jpeg

Detection and Response is Top Security Priority for Organizations in 2017

Research firm Gartner today released a report titled “Market Insight: Security Market Transformation Disrupted by the Emergence of Smart, Pervasive and Efficient Security.” The report focuses on the shift in security spending from a prevention-only approach to enhanced detection and response capabilities. This is expected to be a key priority for security buyers over the next five years, and will have a negative impact on budgets for traditional preventive solutions.

Read the source article at Secbi
None

Is Your Company Actually Secure? 6 Security Risks You Might Not Know About

Businesses have always struggled with the idea of business security. Are you doing enough to protect your company, clients, and employees? Is there really such a thing as too much security? Technology is constantly changing, and as such, so are the threats many businesses face. Everywhere you turn, some security company is trying to point out flaws in your security practices and scare you into purchasing additional services that you might not need.

Read the source article at tripwire.com
http://retailnetworksecuritysolutions.files.wordpress.com/2017/03/curata__olnlwelq9pinkeq.jpeg

A weak information security culture means your organization is vulnerable

Organizations normally understand that employees are key to improving information security, but often focus on awareness of policies and procedures. Chantelle van Wyk explains why this approach is ineffective and looks at what else organizations should be doing to strengthen the information security culture. With the marked increase in cyber attacks and ever tighter legislation around data privacy it’s imperative that organizations prioritise security activities and interventions.

Read the source article at Continuity Central
None

This Year’s Top IT Security Trends in the Workplace

On the heels of one of the most vulnerable and insecure years in the cyber world, IT security will not be taken lightly in 2017. We’ve seen victims from the everyday consumer to corporate giants. As the cloud and Internet of Things (IoT)  transform the way we live and work, the security risks surrounding them change as well. This year, and in the coming years, cyber security will become an increasingly more significant priority for companies who want to be sure their data is safe.

Read the source article at Talent 101
http://retailnetworksecuritysolutions.files.wordpress.com/2017/03/curata__arlxqyhxrjnoryk.jpeg

What does being secure really mean?

Security and particularly cybersecurity has repeatedly reached the headlines in recent months. It has widely been acknowledged that there is an ongoing cybersecurity skills challenge which makes recruiting and retaining skilled professionals increasingly difficult, and in part, might be attributed to weaker security for some organisations. However, looking at cybersecurity more broadly, a fundamental question is – what does being secure really mean?

Read the source article at NTT Security
http://retailnetworksecuritysolutions.files.wordpress.com/2017/03/curata__qx84yenmk5mkxyv.jpeg

Ransomware “Your Money, or your Data!”

Let’s stop the security merry-go-round for a moment and imagine headline-grabbing ransomware as legendary highwayman Dick Turpin. Dick stops us in our tracks on the (information super-) highway and shouts “Stand and deliver! Your money or your data!” In 18th century England, there was no guarantee that even if you did hand over your money and jewels that you would actually escape unscathed, and we’re experiencing the same today with ransomware.

Read the source article at Infosecurity Magazine
http://retailnetworksecuritysolutions.files.wordpress.com/2017/03/curata__sgpwcrkukbpj7g6.jpeg

How To Combat The Rising Ransomware Epidemic

Ransomware is on the rise, with cybercriminals regularly developing new variants of the malware, targeting more businesses, and demanding larger payments to “restore” user data. With the emergence of ransomware-as-a-service (RaaS), even criminals with minimal technical skill can launch devastating attacks against businesses and organizations. According to the FBI, Ransomware payments have dramatically increased to around $1 billion in 2016, compared to just $24 million in 2015.

Read the source article at Louis Kohman
http://retailnetworksecuritysolutions.files.wordpress.com/2017/03/curata__ughryjr5eqpbf6m.jpeg

Why ‘Data Hoarding’ Increases Cybersecurity Risk »

The proliferation of data and constant growth of content saved on premise, in cloud storage, or a non-integrated solution, poses a challenge to businesses, in terms of both compliance and security. This is not helped by the estimation that 80% of content most businesses have is unstructured. A general lack of understanding of how to manage the data and a reluctance to delete content, leads to ‘data hoarding’ and businesses seem unaware of what data is present and what value it holds.

Read the source article at cloudtweaks.com
http://retailnetworksecuritysolutions.files.wordpress.com/2017/03/curata__2ie4ttle49g1jqh.jpeg

Protecting Your Company From Ransomware and Restoring Data After a Breach

The data center is like a castle. You can pull up the drawbridge, fill up the moat or pull down the portcullis. But at some point you must let data in and out, and doing so creates the opportunity for ransomware attacks. No longer is it just a matter of pride and peer recognition among hackers to circumnavigate and expose the security of an organization; it’s now a full-fledged industry thanks to ransomware. Cybersecurity company Herjavec Group estimates it will top $1 billion in 2016.

Read the source article at Data Center Magazine
http://retailnetworksecuritysolutions.files.wordpress.com/2017/03/curata__n9tcidldqt6lr8k.jpeg

Is Your Business Taking Security Seriously? 5 Checks To Make

There’s no point having your cyber security up to date if your physical security doesn’t match it; you still need to take the threat of a break in very seriously because an easy-steal is hard to resist for criminals, and the costs of recovering everything (if you can at all) are huge. Here are five top tips to make sure your business security is the best it can be.

Is everyone aware of the policies?

Read the source article at Business Matters
http://retailnetworksecuritysolutions.files.wordpress.com/2017/03/curata__gmvqqng1f0y2hej.jpeg

Security basics: 9 ways to make IoT devices more secure

Devices must be more secure if IoT is to reach its full potential. The good news is that security policies and procedures can protect enterprise infrastructure, harden IoT configurations, and make the network smarter and more defensible. Here’s where to start. New devices are being plugged into the Internet of Things (IoT) at a rapid pace. While IoT is expected to offer many benefits, adding insecure devices to an enterprise network can have serious consequences.

Read the source article at Welcome to Enterprise.nxt
http://retailnetworksecuritysolutions.files.wordpress.com/2017/03/curata__04smv65st6tjaat.jpeg

Your Business Has Been Hacked: What to Do First

Preparation not only prevents breaches, but also minimizes the impact of a breach on your business operations. Here’s what to do if you’re in the midst of a breach. Experts say it’s no longer a question of if you will be hacked, but of when you will be hacked—and how quickly you can recover to resume operations makes all the difference. After the initial shock, you must act to minimize the effects of a data breach.

Read the source article at OnRamp Data Centers
http://retailnetworksecuritysolutions.files.wordpress.com/2017/03/curata__1izdbtjbtvo9edv.jpeg

Cybersecurity for Everyone: Securing your home or small business network – CyberWar: Si Vis Pacem, Para BellumCyberWar

Specifically for home users and small business owners, cybersecurity expert Terry Sadler lays out the easy-to-learn methods and tips that will make using the Internet more safe and secure and protect the family as well as the business.Identity Theft. According to the Symantec Internet Security Report (2014), mega breaches are data breaches that result in at least 10 million identities exposed in an individual incident.

Read the source article at Cyberwar
http://retailnetworksecuritysolutions.files.wordpress.com/2017/03/curata__ollusggprxvkjsc.jpeg

WordPress Security 101: How to secure your website against hackers – CyberWar: Si Vis Pacem, Para BellumCyberWar

WordPress is great for managing your website, but it’s often targeted by hackers. If you want to keep your site secure or deal with a hack after it’s happened, Brecht Ryckaert has your back. This security guide will show you just how to batter down the hatches of your WordPress website. You’ll learn how to counter Brute Forcing attacks, HTTP trace attacks, script injections, XML-RPC attacks and so much more.

Read the source article at Cyberwar
http://retailnetworksecuritysolutions.files.wordpress.com/2017/03/curata__eipuyexnfyzdljp.jpeg

Almost All Security Professionals Fear an Increase in Attacks on Industrial IoT

As nice as it is to have a connected world, the security threats brought on by the desire to have every device we own connected to the Internet are great. In fact, a staggering 96% of IT security professionals expect an increase in attacks on industrial Internet of Things.

Read the source article at Latest News & Reviews by Softpedia
http://retailnetworksecuritysolutions.files.wordpress.com/2017/03/curata__uhdfqcixsizoiou.jpeg

RoT: Ransomware of Things

Major security breaches have hit headlines the past year, their severity ranging from infecting a few hundred to a few million users. We have seen much variety, like holding sensitive data hostage for ransom, DDoS attacks, and various exploitations of IoT devices. Sadly, this trend will continue to rise if security remains a secondary concern. ESET researchers predict the next step in the evolution of malware could be a cross between the known approaches.

Read the source article at Malc0de
http://retailnetworksecuritysolutions.files.wordpress.com/2017/03/curata__wmxr8rvcvgl4lei.jpeg

Cybersecurity pros say more industrial IoT cyberattacks expected

The results of a recent survey querying IT security pros about the threats posed by devices tethered to the internet were practically unanimous: 96 percent of them said they expect to see an increase in security attacks on IoT. While the study by Tripwire recognized the enormous promise of these devices in facilitating tasks and bringing convenience, ultimately simplifying life for millions, IoT devices also hold a risk as they are not always built with security in mind.

Read the source article at Cybersecurity News and Product Reviews
http://retailnetworksecuritysolutions.files.wordpress.com/2017/03/curata__prymrjgpcs8y59w.jpeg

10 Steps to Cyber Security – Amshire

Cyber-attacks continue on a daily basis, and the scale and rate of these attacks shows little sign of abating as born out in the latest Cyber Security survey see Cyber Security – How Business are Faring THE 10 CYBER SECURITY STEPS guidance is for businesses looking to protect themselves in cyberspace. Originally published in 2012 and now used by around two thirds of the FTSE350, the guidance remains the same and is reproduced below.

Read the source article at amshire.co.uk
http://retailnetworksecuritysolutions.files.wordpress.com/2017/03/curata__pe5r0ica6h4snva.jpeg

Why third-party risk is worth the reward

We’ve heard the fateful story of the Target hackers breaking into company systems using network credentials taken from its refrigeration and HVAC provider. In the worst-case-scenario story, a network security shortcoming was compromised from seemingly one of the unlikeliest of places. The major data breach served as a glaring example of third-party vulnerabilities and the risk they can introduce to an enterprise.

Read the source article at ciodive.com
http://retailnetworksecuritysolutions.files.wordpress.com/2017/03/curata__5bavniyd1dxq2xd.jpeg

Nine Security Tips That Go Outside the Box

The great challenge of security is that you are not only battling Murphy’s Law — the universal tendency of things to go wrong — but also shrewd and malicious attackers who are looking for an edge. Rather than constantly changing strategies to match these evolving threats, many security pros could benefit from finding a few simple methods that can stand the test of time and help prevent a breach.

Read the source article at Security Intelligence
http://retailnetworksecuritysolutions.files.wordpress.com/2017/03/curata__nqod7irl2tl7uzt.jpeg

Advanced Threat Protection: Expert Tips for Protecting Your Organization Against Advanced Threats

Advanced threats have become a serious problem for today’s enterprises. Often a moving target, advanced threats are among the most challenging security threats for companies to mitigate, requiring a multi-faceted approach that identifies threats and successfully blocks them before compromise or data loss occurs.

Read the source article at Data Loss Prevention Software
http://retailnetworksecuritysolutions.files.wordpress.com/2017/03/curata__gdnqnp0n8rxdxih.jpeg

How bad endpoint security can leave IT pros flying blind

Businesses with dispersed and on-the-move employees are struggling to strike a difficult balance between the benefits of remote working and the security risks it creates. Security software designed to protect data at risk is nullified if it can be removed. To achieve their own stringent security aims while satisfying the demands of increasingly tight and punitive regulation, companies need a more persistent security solution.

Read the source article at ITProPortal
http://retailnetworksecuritysolutions.files.wordpress.com/2017/03/curata__muwcrxecsfaghca.jpeg

Slow and steady will not win the cybersecurity race

Agile security is essential to any business, but the opinions over how (and when) security should be integrated into the DevOps cycle vary greatly. While we always recommend that you bake security into your plans from the start, there are often barriers to doing so depending on a company’s use of the cloud and cohesion between Dev and Ops teams.

Read the source article at The CloudPassage Blog
http://retailanditconsulting.com/wp-content/uploads/2017/03/curata__0qzubzrbmhhitba.jpeg

CenturyLink: Changing the Security Mindset

Businesses need to stop thinking of cybersecurity as an IT function and think of it as an ongoing activity such as accounting, the head of CenturyLink’s security services says.

In an interview with Light Reading the day after he’d hosted a CenturyLink Inc. (NYSE: CTL) Cybersecurity Summit in Monroe, La., Bill Bradley, the SVP of cyber engineering and technology services, admits he and others in the field are frustrated by the continuing need to get businesses to update their security efforts and take them more seriously. Given the way data breaches dominate the headlines, it’s hard to …

Read the source article at Light Reading
http://retailanditconsulting.com/wp-content/uploads/2017/03/curata__ytjk7hgudd2uefu.jpeg

The power of knowledge in the fight against cyber security

In the face of the challenges cyber security poses to our everyday lives, how can businesses ensure that they have the knowledge to protect themselves online? Not a day goes by without a news story on the topic of cyber security. It’s a subject which dominates digital forums frequented by IT professionals and the national media, rousing concern from the general public about how safe the digital landscape is and who has access to our personal information.

Read the source article at ITProPortal
http://retailanditconsulting.com/wp-content/uploads/2017/03/curata__cinil6kd7hwi7sw.jpeg

7 cybersecurity issues small businesses need to understand in 2017

Security breaches and cybercrime incidents hit the headlines in 2016, as high-profile news of data breaches, malware, DDoS attacks and compromised systems became mainstream news. The news reports inevitably focused on cyber-attacks on major corporations, such as the data thefts from TalkTalk, Three and Tesco Bank, as well as the extraordinary autumn story of the attack on Dyn, which made use of IoT-enabled household devices, such as fridges and toasters, to form a botnet that successfully brought down an enormous number of websites, both large and small. Whilst the past year was eventful, to say the least, in terms of …

Read the source article at bytestart.co.uk
http://retailanditconsulting.com/wp-content/uploads/2017/03/curata__dumlrfbj3jrl8sn.jpeg

Six ways to defend against digital threats

The digitisation of manufacturing, or Industry 4.0 as it is commonly known, is driving industrial operators to achieve new levels of productivity, quality, and visibility. It doesn’t take the genius of early industrial innovators like Robert Louis Stephenson to see that manufacturers who connect their factory systems with their enterprise networks will create a more agile, efficient, flexible and profitable business.

Read the source article at themanufacturer.com
http://retailanditconsulting.com/wp-content/uploads/2017/03/curata__p6fgikucvabnubp.jpeg

One-third of ransomware victims pay associated ransoms

61% of organizations were compromised by ransomware in 2016, while the percentage of organizations affected by successful cyber attacks reached an all-time high, according to a study conducted by CyberEdge Group. The report also found that one in five respondents indicated dissatisfaction with Microsoft’s available protections for securing Office 365 deployments, opening the door for third-party security solutions.

Read the source article at Home – Resilience Today
http://retailanditconsulting.com/wp-content/uploads/2017/03/curata__nve9luooa0zkj9y.jpeg

Gartner Says Detection and Response is Top Security Priority for Organizations in 2017

Enterprises are transforming their security spending strategy in 2017, moving away from prevention-only approaches to focus more on detection and response, according to Gartner, Inc. Worldwide spending on information security is expected to reach $90 billion in 2017, an increase of 7.6 percent over 2016, and to top $113 billion by 2020. Spending on enhancing detection and response capabilities is expected to be a key priority for security buyers through 2020.

Read the source article at Technology Research
http://retailanditconsulting.com/wp-content/uploads/2017/03/curata__izfd1s0a5dbntaw.jpeg

The Business Imperative for Strong Cyber Security

There are more reasons to invest in cyber security than you might initially think. Of course, it keeps a business’s IP and finances secure and protects staff personal information. For those organizations dealing with customer information, it keeps that data secure as well, which protects their continued custom. But on top of all those well-known reasons, there is perhaps one that is not considered enough – the additional business opportunities it opens.

Read the source article at Global Data Sentinel
http://retailanditconsulting.com/wp-content/uploads/2017/03/curata__ywc5cqpv3a6nvnm.jpeg

Top Cyber Security Issues for 2017 from Leidos Outlook & Trends

They say the quality of our thinking is often a function of the quality of the questions we ask. In this regard we can get some great improvements in our thinking based on the Leidos 2017 Cybersecurity Forecast. Titled “Security Trends and Predictions: 2017 Demands a New Approach,” the Leidos report includes input from Forrester Senior Analyst, Joseph Blankenship, who provided responses to five FAQs based on his presentation of security trends and predictions for 2017.

Read the source article at T&D World
http://retailanditconsulting.com/wp-content/uploads/2017/03/curata__9iqqjveblmp3esh.jpeg

Securing the Internet of Things

Internet of Things security. First and foremost, the industry has to overcome its tendency to place adoption ahead of security. Campaigns have to be run to raise awareness that IoT devices need to be secured. Plug-and-play, default settings, and wide-open devices are not conducive to a secure environment — yet they represent the bulk of current IoT products and services.

Read the source article at eSecurity Planet
http://retailanditconsulting.com/wp-content/uploads/2017/03/curata__vlaianjns33lchq.png

8 Ways to Prevent a Security or Data Breach

Here are some security tips all small businesses should heed and implement to protect their customers — and business.

You may not think your small business is large enough to attract the attention of virtual thieves and cybercriminals, but any business that processes customer payment information is a potential victim of a security or data breach.

Here are some security tips all small businesses should heed and implement to protect their customers and business:

Read the source article at Business.com
None

3 Easy Tips to Save Your Employees a Big Cybersecurity Headache

While organizations need to focus on network security monitoring and sophisticated security tools to defend their IT assets, individuals can also take their own steps to beef up digital defenses. Improvements to ordinary users’ endpoint security don’t just benefit employees at home—the improvements help cybersecurity at the office, too, when workers bring personal devices to use on company networks.

Read the source article at EiQ Networks Blog
http://retailanditconsulting.com/wp-content/uploads/2017/03/curata__cxljh8kiupyssnc.jpeg

The Case for Securing IoT

With the advent of the Internet of Things into the mainstream technology hallways, cyber-attacks on IoT devices too are increasing. The past year saw a host of Distributed-Denial-of-Services (DDoS) attacks on popular sites such as Netflix and Twitter and the rise of the Mirai botnet as a potent threat. Looking at the current security ecosystem, it is high time that IoT-makers take on the challenge to make their devices and networks secure.

Read the source article at ReadITQuik
http://retailanditconsulting.com/wp-content/uploads/2017/03/curata__baxef0pezljsyki.jpeg

According to Hackers, Windows 10 Security Passes the Test

Windows is perhaps the most common workplace computing tool, and hackers have been trying for decades to uncover holes in its security. In some cases, like with unsupported operating systems, they’ve succeeded. However, Microsoft’s latest addition to their OS family, Windows 10, seems to have exceptionally potent built-in security measures, many of which have the hackers at the Black Hat conference scratching their heads and scrambling to find threats to talk about.

Read the source article at Managed IT Services & IT Support
http://retailanditconsulting.com/wp-content/uploads/2017/03/curata__ymnigbx5nchapoc.jpeg

Security and Compliance – A Relentless Battle – ISACA Now

The overall objective for security controls is to support the organization’s services and infrastructure by identifying risks, improving the security level, and enabling rapid detection and response to security attacks. It is also true that, in practice, no organization can place all the security controls against every cyberattack by itself. Consequently, it is now a growing practice that many organizations leverage a hybrid model for their security controls.

Read the source article at Information Technology
http://retailanditconsulting.com/wp-content/uploads/2017/03/curata__du4xanoiizdtzeg.jpeg

Is Your Business Taking Cyber Security Seriously? – BubbleIT

In previous decades, cyber security was unheard of. But in today’s world of modern business, we have to deal with a huge variety of potential issues and security threats. In the past, business would be conducted exclusively using paper and written documentation. Security would involve physical building security and the correct storage and protection of archived data.

Read the source article at Managed IT Support Nottingham
http://retailanditconsulting.com/wp-content/uploads/2017/03/curata__amcu0qudaa1ktuc.jpeg

Consumer Reports To Consider Cyber Security In Product Reviews

A recent announcement from Consumer Reports, an influential US group that conducts extensive product reviews, suggests that they are gearing up to start considering cyber security and privacy safeguards when scoring products. IT security experts from LogMeIn and Allot Communications commented below.

Ryan Lester, Director Of IoT Strategy at Xively by

Read the source article at home – Information Security Buzz
http://retailanditconsulting.com/wp-content/uploads/2017/03/curata__thoggouzz7vkzkb.jpeg

Are companies doing enough on the IoT security front? | Networks Asia | Asia’s Source for Enterprise Network Knowledge

We continue to hear dire warnings about the inherent security risks of the Internet of Things (IoT), and indeed IoT-related incidents are happening. With many companies beginning to capture IoT data from connected devices, a key question is are they doing enough to ensure that data and networks are secure?

Read the source article at Networks Asia
http://retailanditconsulting.com/wp-content/uploads/2017/03/curata__p6ozgdrqhrwkjad.jpeg

Why an Effective Security Program Is Crucial For Long-Term Success –

With technology integration only becoming more important to the productivity and daily operations of business, have you thought about the importance of an integrated security program to uphold that vital digital infrastructure? If your company’s security practices are not holistic and account for every vulnerable area of your business, it can affect long-term success.

Read the source article at Foresite
http://retailanditconsulting.com/wp-content/uploads/2017/03/curata__9coq8awtac8jwlx.jpeg

How to Protect Your Data from Tax-Time Hackers

Protecting your data is especially important during tax season, when sensitive information about your business and your employees is susceptible to attack by would-be identity thieves. Faux calls and emails from attackers posing as representatives of the IRS or even managers within your organization are commonplace and can lead to the theft of information from unsuspecting employees. Luckily, there are steps you can take to bolster your security during this time of increased vulnerability.

Read the source article at Business News Daily
http://retailanditconsulting.com/wp-content/uploads/2017/03/curata__iwvuz7hii9npxeh.jpeg

Protect Your Business From Catastrophic Data Breaches

A data breach will cost a business $4 million on average, according to a 2016 study from IBM. Large organizations have more to lose; Yahoo’s sale price was reduced by $350 million after being hit by the largest breach in history. US companies are now scrambling to meet the stringent data privacy rules required by the EU General Data Protection Regulation (GDPR) when it is introduced in 2018.

Read the source article at Global Trade Magazine
http://retailanditconsulting.com/wp-content/uploads/2017/03/curata__awhfhhml6eqesct.jpeg

Why Printers Still Pose a Security Threat

Newly discovered security flaws in popular printers remind us how networked devices continue to put users at risk. Networked printers for years have left gaping holes in home and office network security. Today, experts continue to find flaws in popular laser printers, which are putting businesses at risk. Experts at the University Alliance Ruhr recently announced vulnerabilities in laser printers from manufacturers including Dell, HP, Lexmark, Samsung, Brother, and Konica.

Read the source article at Dark Reading
http://retailanditconsulting.com/wp-content/uploads/2017/03/curata__j6en0xarcsvpksk.jpeg

Experts predict 2017’s biggest cybersecurity threats

From internal threats to creative ransomware to the industrial Internet of Things, security experts illuminate business cybersecurity threats likely to materialize in the next year. If 2016 was the year hacking went mainstream, 2017 will be the year hackers innovate, said Adam Meyer, chief security strategist at SurfWatch Labs. Meyer analyzes large and diverse piles of data to help companies identify emerging cyber-threat trends. “2017 will be the year of increasingly creative [hacks],” he said.

Read the source article at techrepublic.com
http://retailnetworksecuritysolutions.files.wordpress.com/2017/03/curata__0ix7zdfjwlent5w.jpeg