Tag Archive: Cyberattack

Coronavirus-Themed Cyberattacks To Watch Out For

Written by
Published 05/06/2020

The novel coronavirus isn’t the only plague affecting businesses. Cyberattacks are spreading, too, as malicious actors take advantage of interest in COVID-19 news and coronavirus fears to trick people into clicking on phony links and attachments in social engineering and phishing scams. The U.S. Department of Homeland Security’s Cybersecurity & Infrastructure Security Agency (CISA) and the United Kingdom’s National Cyber Security Centre (NCSC) warned of a surge in cybercrime attempts in an April 8 joint statement. According to the agencies, these hackers’ phishing emails and social media posts purport to offer information about the virus—but the links and attachments they contain, when opened, install malware or ransomware. Malicious actors aim to gain access to systems and information or even to…

Tags: ,
Categorized in: ,

Business Continuity Checklist for Planning and Implementation

Written by
Published 12/31/2019

Having a comprehensive business continuity plan (BCP) in place will help ensure that your business doesn’t suffer any downtime in the event of a disaster, which may include natural disasters, such as floods, fire, weather-related events, and cyberattacks. If you’re not prepared, these disasters can have catastrophic consequences on your business, including loss of productivity, loss of revenue, as well as damage to your reputation and your relationships with your customers. A business continuity plan describes all the risks that can affect normal operations. Business continuity planning is important because it helps ensure that your employees and your assets are protected and your company can continue operating no matter what disasters you may face. However, a BCP is different than a disaster recovery plan, which centers around the recovery of your IT…

Protecting Your Data From Ransomware

Written by
Published 07/06/2017

On a certain aesthetic level, you have to admire ransomware attacks. At first glance they seem like just another headache under the broad category of “cybersecurity risk”—but nothing could be further from the truth. Ransomware is fundamentally different from run-of-the-mill threats like network penetration attacks or phishing scams to get the CEO to email employees’ personal data. Foremost, nothing gets “stolen” in the traditional sense of the word—which can mean, under a strict reading of the law, that ransomware attacks don’t need to be disclosed. That crucial distinction has big implications for your internal controls and third-party oversight so that your firm doesn’t fall into ransomware’s trap. Let’s take a look. First, ransomware doesn’t necessarily trigger a duty to disclose,…

Tags: , , ,
Categorized in: