‘Tis the Season for Thieving — Tips to Avoid Theft, Damage, and Expenses This Holiday Season

November and December can be the two most profitable months for e-commerce companies, resulting in shipping volume increases and driving 30% more e-commerce revenue than any other time of year. The optimal customer experience is receiving your package on time and without damage. Learning important shipping tips can help reduce any negative customer experience. Read […]

Payment Cards Stolen in Pizza Hut Website Hack | SecurityWeek

Pizza Hut U.S. informed customers over the weekend that their payment card and contact information may have been compromised after cybercriminals breached its website. Emails sent out by the restaurant chain to affected individuals describe the incident as a “temporary security intrusion” on PizzaHut.com. According to the company, the hackers only had access to the […]

Are retailers shortchanging the digital transformation? – RetailWire

While 90 percent of commerce may still be offline, 95 percent of the growth in retail is expected to come from digital (e-commerce + digitally influenced). And with asymmetric competition — whether big (Amazon, Walmart, etc.) or niche (Harry’s, Casper, Everlane, etc.) — benefiting from the law of accelerating returns, pursuing linear, incremental progress instead […]

How to Detect and Stop a POS Breach Before it Happens

While the holiday shopping season may be over, there’s a strong chance that another wave of point-of-sale (POS) system attacks against retailers, hospitality organizations, and other companies are just around the corner. Experian’s recently released 2017 Data Breach Industry Forecast predicts a continued trend towards attacks against organizations who process cardholder data. Read the source […]

Stop.Think.Connect. Small Business Resources | Homeland Security

Small businesses may not consider themselves targets for cyber attacks due to their small size or the perception that they don’t have anything worth stealing. However, small businesses have valuable information cyber criminals seek, such as employee and customer records, bank account information and access to the business’s finances, and access to larger networks. Read […]

Transactions & Trust: The Value of Blockchain Technology – IBM Retail Industry Blog

Nicole Leinbach Reyhle is the Founder and Publisher of Retail Minded, the Co-Founder of the Independent Retailer Conference and a regular contributor to various publications. Additionally, Reyhle is the author of the book “Retail 101: The Guide to Managing and Marketing Your Retail Business” from McGraw-Hill and has been the spokesperson for Small Business Saturday […]

Mitigating Common Security Threats to Small and Medium Businesses

The early half of 2017 saw malware such as WannaCry and Petya affecting a large number of organizations around the world. While the larger enterprises made the news, a lot of smaller businesses were affected by these attacks. All organizations, from the largest multinational corporation to smaller single proprietorship businesses, are vulnerable to security risks. […]

Point Of Sales Hack: Vulnerability Lets Hackers Buy Anything For $1

A vulnerability discovered by security researchers in a popular point of sales system allows attackers to steal credit card and payment information, alter vital files within the system and change the prices for any item. Researchers at cybersecurity firm ERPScan first discovered the vulnerability, which affects the SAP POS Xpress Server and SAP point-of-sale clients, […]

Nordic digitisation brings unwanted consequence of heightened cyber security risks

Major cyber attacks and security breaches often make headline news these days – and their impact on the Nordic region has been growing. The rapid digitisation of Nordic life has brought with it opportunities for criminals and, according to Jarno Limnéll, professor of cyber security at Finland’s Aalto University and vice-president of Insta Group, there […]

This is where your cybersecurity system isn’t working

The enterprise workplace is filled with web-connected touchpoints that offer improved agility, productivity, efficiency and computing power. Unfortunately, those same touchpoints can also represent security threats, especially if your organization’s cybersecurity system isn’t comprehensive in how it protects the entire network. Read the source article at Mobile Business Insights

Lack of cyber hygiene leaves 90% of businesses vulnerable to hacks | National Cyber Security Ventures

90% of businesses report exploits of vulnerabilities dating back three or more years, leaving them open to hacks. The vast majority of businesses are recording exploits for vulnerabilities that are three or more years old, with just over half reporting 10 year old vulnerabilities. That’s according to Fortiguard, which found in its Q2 data that […]

5 Things E-commerce Business Owners Should Know About Cybersecurity

The e-commerce market is constantly growing as there are new online businesses being opened every single day. And every company that sells stuff online holds onto each of their customers’ personal information. Because of this, e-commerce businesses are quite attractive to hackers and there are tons of companies who unfortunately had to deal with hacker […]

Security Professionals Risk Breaches By Turning Off Security To Please The Business

CUPERTINO, Calif. Bromium®, Inc., the pioneer and leader in virtualization-based enterprise security that stops advanced malware attacks, today released results of a survey of 175 security professionals conducted at this year’s InfoSecurity Europe, which found that IT security is often deprioritized when it interferes with employee productivity. Read the source article at home – Information […]

New Cyber Attacks Mean Back to Basics

In the wake of the Petya/NotPetya Ransomware/NotRansomware outbreak, security researchers and vendors are cashing in with blog posts, analyses, and expert advice on how to avoid becoming the next victim. The aim of all this noise is, partially, to help organizations understand the details of the attack, how it succeeded (is succeeding), and what controls […]

The Lessons of WannaCry Attack

On May 12, what experts are calling “the largest ransomware infection in history”[1] was launched against more than 200,000 computer targets in 150 countries. Called “WannaCry,” the hack cast a harsh light on the growing threat of ransomware, and that of Distributed Denial of Service (DDoS) attacks in general. In global research that was released […]

WannaCry and (Non) Petya prove we’re missing a security beat industry-wide

For the second time in just a few weeks, British companies were exposed to ransomware attacks that their ageing security infrastructures couldn’t withstand. Not only did these malicious acts hold personally identifiable information to ransom, they also impacted medical procedures, airline travel and corporate share prices. WannaCry as well as (Non) Petya relied on unpatched […]

Employees are your biggest risk: Data hygiene needs to start at the top

From the recent WannaCry malware attack, which affected organisations across the globe, to the ongoing allegations of nation state cyber espionage, cyber security is never out of the news. To help tackle this ever-evolving threat landscape, there’s a whole host of tools and services available to businesses that offer everything from antivirus software to network […]

Time to get real. Cyber threats are everywhere.

Are you concerned about cybersecurity? You should be. We read of Russian meddling in our last election. We hear about ransomware attacks bringing large and small organizations to a standstill. Meanwhile, countless denial-of-service attacks seek to interfere with our favorite social media apps and services. Just last week we learned of widespread cyber hacking of […]

The 5 W’s of investigating cyber attacks

CSO magazine estimates that Cyber crime damages costs will hit $6 trillion annually by 2021. The recent WannaCry ransomware attack that affected over 100 countries and organizations in multiple industries was a stark reminder that cyber attacks are a very real threat. In 2016, there was a 600% increase in the number of ransomware attacks, […]

The Biggest Cybersecurity Disasters of 2017 So Far

The first six months of 2017 have seen an inordinate number of cybersecurity meltdowns. And they weren’t just your standard corporate breaches. It’s only July, and already there’s been viral, state-sponsored ransomware, leaks of spy tools from US intelligence agencies, and full-on campaign hacking. And that’s just the beginning. Let this recap of 2017’s biggest […]

Updates to NotPetya Lead to Server Seizure at …

Police seized servers from Ukraine’s Intellect Service as the country scrambles to control a cyberattack allegedly conducted by advanced hackers. Ukrainian law enforcement has seized servers from software firm Intellect Service, makers of the M.E.Doc accounting software widely exploited last week in destructive cyberattack researchers report was conducted by highly skilled threat actors. Read the […]

Patch management could have stopped NotPetya attacks: Verizon

Good patch management could have stopped the spread this week of the NotPetya ransomware, says one of the world’s expert investigators of cyber breaches. “It’s interesting me they’re successful at all because they’re attacking known vulnerabilities,” David Ostertag, global security investigations manager at Verizon Enterprise Solutions, told Canadian reporters on Wednesday. Read the source article […]

As Ransomware Attacks Spike, Organizations Need to Catch Up

The latest operating systems provide better security than ever. But as the WannaCry outbreak demonstrated, many devices still run older, no longer supported operating systems, and many organizations and individuals became malware victims, in part, because of their reliance on those outdated systems. See Also: Spear Phishing, Identity Deception, Ransomware: How to Predict the Future […]

Who’s responsible for Cyber Security at my Company?

Many companies hold IT solely responsible for online information privacy and security, but experts agree that this is not a sustainable security business model. In an interview with the Wall Street Journal, Former CIA and NSA Director, Gen. Michael Hayden, calls cyber space “… the largest ungoverned space in recorded human history,” adding “there is […]

Half of Ransomware Victims Are Hit Multiple Times

Half of organizations hit by a ransomware attack are struck multiple times, with exposed infrastructure stretching well beyond the endpoint, according to a new study from Druva. The security vendor polled over 830 IT professionals across the globe to compile its Annual Ransomware Report. It revealed that 80% believe attacks are increasing, with half of […]

Cybersecurity Training Often a Tangled Web

Damaging cybersecurity attacks have become an increasingly regular occurrence in business. In 2013, Target Corp. notified 70 million customers that hackers had stolen their personal data from their computer systems. In 2016, Yahoo Inc. informed 500 million users their names, email addresses, dates of birth and telephone numbers were stolen by hackers. And just this […]

Global ransomware attack may not have been for money

The dramatic data-scrambling attack that hit computers around the world Tuesday appears to be contained. But with the damage and disruption still coming into focus, security experts worry the sudden explosion of malicious software may have been more sinister than a criminally minded shakedown of computer users. Read the source article at cnbc.com http://retailnetworksecuritysolutions.files.wordpress.com/2017/06/curata__kvt0g95mlgb118e.jpeg

Where Business is Getting IoT Security Wrong

Securing IoT is tricky business. IoT exploits include firmware spoofing, compromising hardware, man-in-the-middle attacks, interface exploits, and cloud hosted application hacks, among others. Businesses are not always ready for the unique security challenge posed by the massive deployment of IoT devices. Read the source article at IT Communities http://retailnetworksecuritysolutions.files.wordpress.com/2017/06/curata__ci159jyfp3li6as.jpeg

Lexmark discusses security – The Recycler

After the WannaCry virus infecting hospitals and businesses worldwide, Lexmark looks at the risks and solutions. As cyber attacks hit the headlines again Lexmark said that it is “riskier than ever” having employees travelling with computers and “mobile devices that allow access to emails, files and data”. Read the source article at therecycler.com http://retailnetworksecuritysolutions.files.wordpress.com/2017/06/curata__xecqluz96lnvijf.jpeg

Top 8 Cyber Security Attack Types and How to Avoid Them

HPE Secure Compute: Find out how security information management, governance, application security and event management help you avoid the top eight cyber security attack types—while reducing the cost of cybercrime. Cyber security attacks are continuing to grow in both volume and sophistication. Cybercriminals now take computer systems hostage at hospitals across the U.S., and they […]

Cybersecurity Governance: Transform Mediocrity into Excellence

Good cybersecurity requires full commitment from senior management: in fact the international standard for information security demands it. The concept of strong leadership lies at the heart of ISO 27001: “Top management shall demonstrate leadership and commitment with respect to the information management system”. That puts responsibility for creating and maintaining an environment in which […]

3 Cybersecurity Practices That Small Businesses Need to Consider Now

All businesses, regardless of size, are susceptible to a cyberattack. Anyone associated with a company, from executive to customer, can be a potential target. The hacking threat is particularly dangerous to small businesses who may not have the resources to protect against an attack let alone ransomware. Read the source article at Tech.Co http://retailnetworksecuritysolutions.files.wordpress.com/2017/06/curata__9ty1slhiiw25qru.jpeg

Ten Cybersecurity Tips for Small Businesses

Broadband and information technology are powerful tools for small businesses to reach new markets and increase sales and productivity. However, cybersecurity threats are real and businesses must implement the best tools and tactics to protect themselves, their customers, and their data. Read the source article at Minority Business Development Agency http://retailanditconsulting.com/wp-content/uploads/2017/06/curata__s2qtpcm16kpfwj8.jpeg

The Newbie Retailer’s Guide to E-commerce Security

A secure web environment ensures the protection of customer data, but it also makes for a fast and optimized website that drives conversions. An unsecured web environment will be slow, frequently unresponsive, and even dangerous. Opening your first online store is an exciting milestone, and security should be one of your priorities. It’s important that […]

Ransomware: The Risk is Real | SecurityInfoWatch.com

On May 12, the now-familiar threat of ransomware took the offensive, as more than 230,000 computers in 150 countries were encrypted for ransom at hospitals, telecommunications systems, governments, banks and more. Known as “WannaCry,” the ransomware demanded 300 bitcoin in exchange for decryption. The attack exploited known vulnerabilities in an older version of Microsoft Windows […]

How to protect your business data from cyber -attacks?

“By 2018, 40 percent of large enterprises will have formal plans to address aggressive cybersecurity business disruption attacks”-Gartner. Stories of cyber threats disrupting businesses hit headlines almost daily. Cyber-attacks vary from phishing to DDOS attacks to SQL attacks to malware – with ransomware being the latest. So, cyber- attacks have different forms but have one […]

New Mac Malware Discovered on Dark Web as Security Experts Remind Mac Users Not to Be ‘Overconfident’ – Mac Rumors

Two new pieces of malicious software aimed at Mac computers have been discovered on the Dark Web, offered through Malware-as-a-Service (MaaS) and Ransomware-as-a-Service (RaaS) portals and estimated to have been up for around the past three weeks, beginning May 25. Read the source article at Mac Rumors http://retailnetworksecuritysolutions.files.wordpress.com/2017/06/curata__ejfy5wzki3pgakr.jpeg

Don’t Forget Basic Security Measures, Experts Say

Some security leaders argue there is little point in worrying about emerging threats when businesses can’t defend against today’s attacks. INTEROP ITX – Las Vegas – New technologies like machine learning, artificial intelligence, and IoT will drive the scale and complexity of cyberattacks. Businesses have every reason to be concerned as the threat landscape continues […]

Four Takeaways from the WannaCry Ransomware Attacks

The recent WannaCry ransomware attacks put cyber security on the front page of every newspaper in the world. Now, everyone knows what ransomware is and how destructive it can be, but will anything change? Following are four critical lessons that both organizations and individuals should take away from WannaCry. Too many businesses still think that […]

Cybersecurity: A Small Business Guide

Online threats are on everyone’s minds after this week’s breach at OneLogin. The identity and access management company with over 2,000 enterprise clients was hacked, and the fallout isn’t over. During the security breach, private information about users, apps, and various keys may have been obtained by the still unknown hackers. Read the source article […]

Good Security Makes Good Business Sense

Nearly every day, a cybersecurity news article hits the press, so it’s not surprising that senior executives are asking their chief information officers and security teams whether their own company might be the next victim of cybercrime. But that’s not the only question they should ask, because preventing cybercrime is not only about managing risk […]

5 Essential Measures for a Business Security Plan

The tech-driven transition of business enterprises has brought immense benefits for the organizations. It has quantified work and performance, optimized efficiency, and made it convenient for business organizations to expand their areas of operations and invade new markets on the global spectrum. Read the source article at tripwire.com http://retailnetworksecuritysolutions.files.wordpress.com/2017/06/curata__m5y6m31khsfconr.jpeg

7 Fallacies That Could Impact Your Network Security

The mounting threats to network security may stem from external sources, but common misunderstandings about how to protect a business’ networks against them can create one big threat from within. High profile cases regularly make the headlines, proving that even the biggest businesses are failing to understand how to responsibly safeguard against potential attacks. Read […]

4 Cybersecurity Best Practices to Bolster Small Business Defenses – National Cyber Security Ventures | Hacker News

As cybervillains intensify efforts to crack into your networks and devices, here’s how to keep your data safe. Through its exercise videos and nutritional shakes and supplements, Beachbody helps people get buff, lose weight and live healthier lives. In fact, the fitness company’s IT team knows all about working up a sweat, but in their […]

Once Stolen, What Do Hackers Do With You Data?

It’s a common question: What happens to your data after a hacker steals it? Understanding the nuts and bolts of an attacker’s post-hack routine is not only interesting, but it could also help you minimize the damage if your data is stolen. (Note that the following information is a general overview of the most common steps […]

Cyber-crime targets: No company is too small

Cyber security is arguably the most challenging issue facing companies today. According to a new governmental report on cyber security breaches for 2017, businesses are increasingly looking to websites, social media pages and the use of cloud services, meaning that companies need to ensure these platforms and services are kept secure and managed effectively. Read […]

Evolving Cyber Threats Require Evolving Training – ISACA Now

Today’s cyber security professional is an amalgamation of haphazard professional experience, rapid-fire bootcamps, and smatterings of dynamically defined academic programs. This has created a vibrant field, full of individuals with creative takes on issues and unconventional approaches to problems that are difficult to predict. However, as the field matures and the online attackers ratchet up […]

WannaCry ransomware prompts legacy MS17-010 patch

Microsoft responds to WannaCry ransomware with an MS17-010 patch for legacy systems as new ransomware variants spread to more countries around the globe. WannaCry ransomware exploded over the weekend and spread like a worm to infect more than 200,000 systems across 150 countries around the world, according to Europol. In response, Microsoft took the emergency […]

Where the global cyberattack has hit hardest

NEW YORK — Here is a look at some of the places hit by the global cyberattack. EUROPEAN UNION — Europol’s European Cybercrime Centre, known as EC3, said the attack “is at an unprecedented level and will require a complex international investigation to identify the culprits.” Read the source article at StarTribune.com http://retailnetworksecuritysolutions.files.wordpress.com/2017/05/curata__t7pznavxe9iq7fw.png

The blame game, ransomware edition: Who’s at fault?

NEW YORK — From governments to individuals, there’s plenty of finger-pointing going on following the latest global cyberattack. Who’s being targeted for blame? There’s Microsoft, whose ubiquitous Windows operating systems were compromised after attackers exploited a security hole. Then there’s the U.S. government, whose Windows hacking tools were leaked to the internet and got into […]

Proactive approach needed for cyber security: report

This is according to a report released by global technology association CompTIA. The report, titled The Evolution of Security Skills, states companies need to adopt various proactive measures to identify weak links before they are exploited; broaden the security skills of their technology professionals, as well as to implement top to bottom security training throughout […]

Ransomware And Retail

Imagine turning on your smartphone and finding that it has been completely locked out by a stranger demanding payment, a cybercriminal. If you have ever lost access to your phone for other reasons, you know the frustration of not being able to get to your contacts, emails, calendar or any communication convenience. Now imagine this […]

Government: Half of UK Firms Hit by Cyber-Attack

Nearly half (46%) of UK firms experienced a breach or cyber-attack last year, with many still failing to implement basic, formalized security despite spending money on threat defence, according to a new government report. The Cyber Security Breaches Survey 2017 was commissioned by the Department for Culture, Media and Sport (DCMS) as part of the […]

PCI Compliance is Cheap Compared to EU GDPR

At RBTE at Olympia London, May 09 2017, a panel of payment security experts considered the future of secure payments and the impact that EU GDPR will have in a panel session titled Strengthening security without losing sales. Jeremy King, international director of the PCI Security Standard Council, admitted that PCI compliance is “an expensive, […]

26,000 Debenhams Customers Breached

A cyber-attack has compromised the personal data of up to 26,000 Debenhams customers. The breach, which is understood to have been malware-based, targeted the online portal for the retailer’s florist arm, Debenhams Flowers. IT security experts from Cylance, Imperva and Kaspersky Lab commented below. Anton Grashion, Managing Director Security Practice at Ajay Uggirala, Director at […]

How Your Business is Being Hacked and How to Stop It

60% of small companies that suffer a cyber attack or breach are out of business within six months, according to data from the National Cyber Security Alliance. Small businesses that previously escaped the attention of cyber criminals are now increasingly targeted by these catastrophic attacks. If you’re an SME, cyber security is more important than […]

The IoT Impact on Businesses

The Internet of Things (IoT), in which all manner of devices and things are connected, is enabling digital transformation in many walks of life. It’s also heralding the promise that we will soon live in hyperefficient smart cities. But how does this affect business? A recent report from The Economist Intelligence Unit (EIU) gauged the […]

Why Adaptive Crimes Are a Threat to Your Business—and Customers | Dealer Marketing

While you’re reading this, adaptive cyber criminals may be targeting your dealership and your customers—to steal your money and their identities. Today’s cyber thieves and hackers seem to remain one step ahead of security systems and theft deterrent tools, but that’s changing. That’s good news for any retailer, including auto dealerships. Cyber crimes are adaptive […]

8 Cyber Security Tips for Small Business

Today, cyber security tips for small businesses should not be taken lightly. If you are like millions of small-business owners in America, you probably cannot imagine how a cyber criminal halfway around the world could possibly cause your business to suffer a data security breach. After all, aren’t hackers busy enough with the Fortune 500? […]

Neiman Marcus: 2015 Breach Exposed Full Card Details

Hackers aren’t giving luxury retailer Neiman Marcus Group a break. See Also: 2017 Predictions on Data Security: Insights on Important Trends in Security for the Banking Industry On April 14, the company disclosed to the California attorney general that a December 2015 breach compromised more sensitive information than first thought. Read the source article at […]

The Biggest Risk to Your Cyber Security Is Your Company

Digital security can no longer be ignored by busiensses. Companies and organisations that fail to identify the most common, significant and serious security concerns or threats are far more likely to be targeted by malicious users or suffer a breach. Read the source article at Acumin Recruitment & Consulting http://retailnetworksecuritysolutions.files.wordpress.com/2017/04/curata__pmi3julltlsvtxs.jpeg

How to fend off cyberattacks and data breaches

Experts in online security and data protection explain how smaller businesses can prevent security breaches and digital attacks. According to research conducted by Symantec, the number of cyberattacks against small businesses (companies with fewer than 250 employees) has been steadily growing over the last six years, with hackers specifically targeting employees (phishing). Read the source […]

SecurityMetrics 2017 PCI Guide Simplifies PCI Compliance Process

/PRNewswire/ — Many businesses still struggle with PCI compliance, making them vulnerable to data attacks. According to SecurityMetrics’ latest forensic data, the average merchant, at the time of data compromise, wasn’t compliant with at least 47% of PCI DSS requirements. The SecurityMetrics 2017 Guide to PCI DSS compliance demonstrates recent forensic data to show where […]

Defending against ransomware attacks in the payment card industry – IT Governance Blog

Ransomware is currently the biggest cyber security concern for many businesses, and the danger of an attack is continuing to grow. There has been a 600% growth in new ransomware families since December 2015, according to a recent Payment Card Industry Security Standards Council (PCI SSC) guide, which also reported that ransomware crime cost businesses […]

3 challenges to securing business data

Success in today’s fast-moving business world hinges on innovation — and data is its lifeblood. But data-driven innovation faces escalating risks from attacks types that are constantly evolving to uncover new vulnerabilities and ultimately, steal valuable data. Staying ahead of cybercriminals requires continually adapting and growing security controls and practices. Many businesses, though, aren’t heeding […]

Keeping Your Business Information Safe

As businesses increasingly move online, new threats to their information security have emerged. Hacker attacks and other security breaches are on the rise, and 70 percent of organizations report having been victims of a successful cyberattack in 2014. With the average cost of a corporate data breach hovering around $3.5 million, protecting critical business information […]

Cyber Attacks: Are you prepared?

The Management Association of the Philippines’ (M.A.P.) participants in last week’s Forum on “Cyber Resilience: A New Board Room Priority” showed that cyber security awareness is growing. More organizations, government or private, realize that their networks are vulnerable to an attack. The ICT department alone cannot handle security; every employee, with the Board leadership, have […]

Prevention Is Key To Enterprise Security Architecture

Prevent, detect and respond are the three pillars of the enterprise security architecture. When enterprises look for the right security framework, there is a growing inclination for CISOs and security heads towards the detect and respond mechanism. Very few place ‘prevention’ at the core of their security strategy. The prevention focused security framework however is […]

4 Security Questions to Ask When Outsourcing IT Operations to Make Sure Your Business Isn’t at Risk

Outsourcing IT operations to managed IT services providers (MSP) is a common trend for a business looking to maintain its operational efficiency while cutting down on cost. In addition to assisting with IT infrastructure management, 38 percent of businesses that hire an MSP do so with the expectation that their business will have enhanced security […]

Startup Security Tips 101: Don’t Become a Statistic

According to a 2016 report from Small Business Trends, 43 percent of cyberattacks target small businesses. Unfortunately, once attacked, 60 percent of them close their doors within six months. The reality is that today’s startups and smaller organizations face unprecedented security challenges. But when asked, only 14 percent classify their ability to mitigate these threats as […]

Key Data-Security Measures for Every Business

Data security is the biggest concern for any business from small to big as they hold lots of sensitive information. But when you consider all the essential information you store practically right from clients’ personal information to financial records, it is not quite difficult to understand why just one single breach could completely cripple your […]

Setting Up Security as a Business: 3 Best Practices for Security Execs

At the beginning of March 2017, a third-party platform launched that promises to be a bidirectional clearinghouse to improve the security industry’s approach to third-party risk management. Called CyberGRX, the company says it will dramatically alleviate what is now a manual, spreadsheet-driven process of vendors being inefficiently assessed by customers. It will allow security teams […]

When Prevention Isn’t Enough: Security Best Practices for During and After a Breach

Cybersecurity threats pose challenges to organizations of all sizes, across every industry. Cyberattackers, phishing attempts, network eavesdropping, malware and many other threats jeopardize the confidentiality, integrity and availability of IT resources on a daily basis. IT leaders must clearly understand these threats and develop security controls that allow them to remain vigilant as these threats […]

4 Key Threats to Information Security this Year

Information security threats in 2017 will be more persistent and damaging than ever before. You need to be prepared for the unknown. This year could see an exponential rise in information security breaches that endanger the integrity and reputation of trusted organisations. Read the source article at Tailored IT Services Brisbane http://retailnetworksecuritysolutions.files.wordpress.com/2017/03/curata__lnyvwjouakkjgr6.jpeg

How Security Awareness Training Can Protect Small Businesses

Small businesses are progressively utilizing information technology in business processes, but aren’t doing it securely. In essence, they do not believe adversaries will target them when there several other big, profitable organizations to attack. As a result, they neglect important measures like security awareness training, which leaves their firm in the crosshairs of cyber criminals. […]

4 information security threats that will dominate 2017

As with previous years, 2016 saw no shortage of data breaches. Looking ahead to 2017, the Information Security Forum (ISF), a global, independent information security body that focuses on cyber security and information risk management, forecasts businesses will face four key global security threats in 2017. “2016 certainly lived up to expectations,” says Steve Durbin, […]

5 Cybersecurity Tools Your Company Should Have

No business, small or large, can afford to ignore cyber security. According to a recent Verizon Data Breach Investigations Report, 60 percent of cyber-attacks target SMBs, largely because they are easier targets. Related: 4 Reasons You Need Developers With Cybersecurity Skills in All Tech Teams But you don’t have to be passive. Here are five […]

What Cyber Security Risk Concerns You Most?

When it comes to effective cyber security risk management, knowing what can hurt your organization is key. In today’s world of complex threats, most organizations have made great efforts to protect customer data and business information. However, many executives my find themselves making complicated decisions that trade-off between managing risk and keeping up with business […]

The Sweet Spot between ‘Compliant’ and ‘Secure’

Proofpoint recently joined a group of security leaders at the World Cybersecurity Congress in London, UK. The main topic of conversation? Regulation. Security and IT professionals are increasingly concerned that the recent uptick in compliance requirements, such as the EU General Data Protection Regulation (EU GDPR), could negatively affect security programs. But complying with regulations […]

Cybersecurity: 5 basic lessons for everyone

Recently we’ve had the opportunity  – quite a fun and interesting opportunity – to visit a number of information security and cybersecurity conferences. These conferences were flooded with relatively ‘new’ developments such as NextGen, the Internet of Things (IoT), IoT DDoS attacks, security intelligence platform, etc. Read the source article at WeLiveSecurity http://retailnetworksecuritysolutions.files.wordpress.com/2017/03/curata__bkizzr9s7x6cuyh.jpeg

Detection and Response is Top Security Priority for Organizations in 2017

Research firm Gartner today released a report titled “Market Insight: Security Market Transformation Disrupted by the Emergence of Smart, Pervasive and Efficient Security.” The report focuses on the shift in security spending from a prevention-only approach to enhanced detection and response capabilities. This is expected to be a key priority for security buyers over the […]

A weak information security culture means your organization is vulnerable

Organizations normally understand that employees are key to improving information security, but often focus on awareness of policies and procedures. Chantelle van Wyk explains why this approach is ineffective and looks at what else organizations should be doing to strengthen the information security culture. With the marked increase in cyber attacks and ever tighter legislation […]

What does being secure really mean?

Security and particularly cybersecurity has repeatedly reached the headlines in recent months. It has widely been acknowledged that there is an ongoing cybersecurity skills challenge which makes recruiting and retaining skilled professionals increasingly difficult, and in part, might be attributed to weaker security for some organisations. However, looking at cybersecurity more broadly, a fundamental question […]

Ransomware “Your Money, or your Data!”

Let’s stop the security merry-go-round for a moment and imagine headline-grabbing ransomware as legendary highwayman Dick Turpin. Dick stops us in our tracks on the (information super-) highway and shouts “Stand and deliver! Your money or your data!” In 18th century England, there was no guarantee that even if you did hand over your money […]

How To Combat The Rising Ransomware Epidemic

Ransomware is on the rise, with cybercriminals regularly developing new variants of the malware, targeting more businesses, and demanding larger payments to “restore” user data. With the emergence of ransomware-as-a-service (RaaS), even criminals with minimal technical skill can launch devastating attacks against businesses and organizations. According to the FBI, Ransomware payments have dramatically increased to […]

How to lock down your security system

As long as data is online there will always be concerns over cyber security. There are many steps a business can take to help better protect their physical security systems from cyber threats. From simple things like not using default or simple passwords, to more advanced steps like using PKI certificates and making sure you […]

How to patch your security blind spots

One of the most challenging – and interesting, and frustrating – aspects of cybersecurity is the sheer unpredictability of industry developments still to come. Sure, analyzing recent history, preparation strategies and common mistakes can offer some direction forward in the security space. However, when a major event takes place, its size and depth usually has […]

Cybersecurity for Everyone: Securing your home or small business network – CyberWar: Si Vis Pacem, Para BellumCyberWar

Specifically for home users and small business owners, cybersecurity expert Terry Sadler lays out the easy-to-learn methods and tips that will make using the Internet more safe and secure and protect the family as well as the business.Identity Theft. According to the Symantec Internet Security Report (2014), mega breaches are data breaches that result in […]

RoT: Ransomware of Things

Major security breaches have hit headlines the past year, their severity ranging from infecting a few hundred to a few million users. We have seen much variety, like holding sensitive data hostage for ransom, DDoS attacks, and various exploitations of IoT devices. Sadly, this trend will continue to rise if security remains a secondary concern. […]

10 Steps to Cyber Security – Amshire

Cyber-attacks continue on a daily basis, and the scale and rate of these attacks shows little sign of abating as born out in the latest Cyber Security survey see Cyber Security – How Business are Faring THE 10 CYBER SECURITY STEPS guidance is for businesses looking to protect themselves in cyberspace. Originally published in 2012 […]

Why third-party risk is worth the reward

We’ve heard the fateful story of the Target hackers breaking into company systems using network credentials taken from its refrigeration and HVAC provider. In the worst-case-scenario story, a network security shortcoming was compromised from seemingly one of the unlikeliest of places. The major data breach served as a glaring example of third-party vulnerabilities and the […]

Nine Security Tips That Go Outside the Box

The great challenge of security is that you are not only battling Murphy’s Law — the universal tendency of things to go wrong — but also shrewd and malicious attackers who are looking for an edge. Rather than constantly changing strategies to match these evolving threats, many security pros could benefit from finding a few […]

Advanced Threat Protection: Expert Tips for Protecting Your Organization Against Advanced Threats

Advanced threats have become a serious problem for today’s enterprises. Often a moving target, advanced threats are among the most challenging security threats for companies to mitigate, requiring a multi-faceted approach that identifies threats and successfully blocks them before compromise or data loss occurs. Read the source article at Data Loss Prevention Software http://retailnetworksecuritysolutions.files.wordpress.com/2017/03/curata__gdnqnp0n8rxdxih.jpeg

CenturyLink: Changing the Security Mindset

Businesses need to stop thinking of cybersecurity as an IT function and think of it as an ongoing activity such as accounting, the head of CenturyLink’s security services says. In an interview with Light Reading the day after he’d hosted a CenturyLink Inc. (NYSE: CTL) Cybersecurity Summit in Monroe, La., Bill Bradley, the SVP of […]

7 cybersecurity issues small businesses need to understand in 2017

Security breaches and cybercrime incidents hit the headlines in 2016, as high-profile news of data breaches, malware, DDoS attacks and compromised systems became mainstream news. The news reports inevitably focused on cyber-attacks on major corporations, such as the data thefts from TalkTalk, Three and Tesco Bank, as well as the extraordinary autumn story of the […]

Six ways to defend against digital threats

The digitisation of manufacturing, or Industry 4.0 as it is commonly known, is driving industrial operators to achieve new levels of productivity, quality, and visibility. It doesn’t take the genius of early industrial innovators like Robert Louis Stephenson to see that manufacturers who connect their factory systems with their enterprise networks will create a more […]

One-third of ransomware victims pay associated ransoms

61% of organizations were compromised by ransomware in 2016, while the percentage of organizations affected by successful cyber attacks reached an all-time high, according to a study conducted by CyberEdge Group. The report also found that one in five respondents indicated dissatisfaction with Microsoft’s available protections for securing Office 365 deployments, opening the door for […]

The Business Imperative for Strong Cyber Security

There are more reasons to invest in cyber security than you might initially think. Of course, it keeps a business’s IP and finances secure and protects staff personal information. For those organizations dealing with customer information, it keeps that data secure as well, which protects their continued custom. But on top of all those well-known […]

Four Security Priorities for 2017

Posted by C Henry on Wed, Mar 1st, 2017 The way in which we approach technology within our organizations changes from year to year as does, and so should our security priorities. Yearly shifts in our security practices are attributed to both new technologies as well as new tactics implemented by cybercriminals. Below are four […]

Securing the Internet of Things

Internet of Things security. First and foremost, the industry has to overcome its tendency to place adoption ahead of security. Campaigns have to be run to raise awareness that IoT devices need to be secured. Plug-and-play, default settings, and wide-open devices are not conducive to a secure environment — yet they represent the bulk of […]

The Case for Securing IoT

With the advent of the Internet of Things into the mainstream technology hallways, cyber-attacks on IoT devices too are increasing. The past year saw a host of Distributed-Denial-of-Services (DDoS) attacks on popular sites such as Netflix and Twitter and the rise of the Mirai botnet as a potent threat. Looking at the current security ecosystem, […]

Security and Compliance – A Relentless Battle – ISACA Now

The overall objective for security controls is to support the organization’s services and infrastructure by identifying risks, improving the security level, and enabling rapid detection and response to security attacks. It is also true that, in practice, no organization can place all the security controls against every cyberattack by itself. Consequently, it is now a […]

Are companies doing enough on the IoT security front? | Networks Asia | Asia’s Source for Enterprise Network Knowledge

We continue to hear dire warnings about the inherent security risks of the Internet of Things (IoT), and indeed IoT-related incidents are happening. With many companies beginning to capture IoT data from connected devices, a key question is are they doing enough to ensure that data and networks are secure? Read the source article at […]

The Future of Cybersecurity

You can’t discuss the future of cybersecurity without considering emerging trends in technology and threat landscapes. As organizations develop and adopt technologies related to big data, cognitive computing and the Internet of Things (IoT), cyberthreats are growing in both volume and complexity. The race is on to secure these systems and devices before fraudsters figure […]

Preparing your organisation for the future: How to manage cyber risk and protect your critical data

2016 has been a record breaking year for cyber attacks. Organisations of all types and sizes have been successfully targeted, from governments and political parties to transnational corporations. For individual companies, a 2016 Ponemon Institute study determined the consolidated total cost of a data breach to be approximately $4 million. Recent regulatory changes promise to […]

How to Protect Your Data from Tax-Time Hackers

Protecting your data is especially important during tax season, when sensitive information about your business and your employees is susceptible to attack by would-be identity thieves. Faux calls and emails from attackers posing as representatives of the IRS or even managers within your organization are commonplace and can lead to the theft of information from […]

Why Printers Still Pose a Security Threat

Newly discovered security flaws in popular printers remind us how networked devices continue to put users at risk. Networked printers for years have left gaping holes in home and office network security. Today, experts continue to find flaws in popular laser printers, which are putting businesses at risk. Experts at the University Alliance Ruhr recently […]

Experts predict 2017’s biggest cybersecurity threats

From internal threats to creative ransomware to the industrial Internet of Things, security experts illuminate business cybersecurity threats likely to materialize in the next year. If 2016 was the year hacking went mainstream, 2017 will be the year hackers innovate, said Adam Meyer, chief security strategist at SurfWatch Labs. Meyer analyzes large and diverse piles […]

PCI Compliance Post #3

The third step to being PCI Compliant is “Protect stored cardholder data.” All card data must be encrypted. Better yet, do not store any credit card data on your point of sales network. Contact us today if you have any questions or would like more information about this! We are passionate about getting companies secure […]

Carla’s Story

This is a very informative video about how much damage a data breach can cause. Carla spent over $120,000 when her restaurant was hit. Contact us today to find out if you’re at risk info@retailnss.com https://youtu.be/JsfUdY89lJc

PCI Compliance Step #2

The second step to being PCI compliant is “Do not use vendor-supplied defaults for system passwords and other security parameters.” Make sure all passwords are unique this includes all computers, applications, and non-standard computers. (i.e. printers) Email us today for more information. We would love to get your company PCI compliant! Email us today for […]

PCI Compliance Step #1

The first step to being PCI compliant is Install and maintain a firewall configuration to protect cardholder data. To achieve this businesses should have a business class router, like the WatchGuard router we offer. This router is a subscription service that is enabled and configured for you. The router should have Gateway Anti-virus, Intrusion Prevention […]

RNSS

We are very excited here at RNSS to be getting our blog going! Stop by and have a look every week to see what’s happening in the world of cybersecurity. We will be posting statistics, relevant news, product information, and other useful tips and tricks! Also, go have a look at our Facebook page or […]