What You Should Know About Cyber Heists

A cyber heist is a robbery that occurs in cyberspace or on the Internet. Hackers usually compromise business networks with e-mail scams and phishing attacks. They also steal usernames, passwords, logon credentials, and challenge questions, and they disable alerts before initiating the heists through the bank. Cyber heists have increased in intensity and sophistication over the past three years. What can you do, as a customer, or as a financial institution, do to protect yourself?

Read more

Lower Cyber Risk and Reduce Liability with TBAT (Threat-Behavior-Attitude-Training)

If you haven’t seen stories about cybersecurity, data breaches, and hackers, then you either avoid the news or you live in a shoebox. If you are a business owner, you have a fiduciary responsibility to protect your company from known threats. Hackers today are a known threat, and statistics show that getting hacked is not a matter of if, but when.

Read more

Are You a Cybersecurity Risk to Your Business?

Despite all of the negativity in the world, as individuals we have a very positive or inflated opinion of ourselves. If you are a business owner, such inflation may be your greatest risk. A positive attitude and high self-esteem are great. But, when it comes to business decisions and recognizing risk, a positive, self-promoting attitude can actually create unrecognizable and elusive risk.

Think about this: how many people believe they are bad drivers, loud, or disliked by others? Not many, right? Similarly, most average business owners consider themselves intelligent, very capable in all areas, and smarter, more influential, and much more savvy than the next guy or gal. That mindset creates a certain level of risk, and the risk increases as the power and influence increases.

Read more

Legal Issues of Cloud Forensics — Part 4

The use of cloud services has skyrocketed primarily because it is cheaper and more convenient than the alternative. Unfortunately, many companies have entered the cloud without first checking the weather forecast or performing a risk analysis. What happens if the cloud gets stormy, you suffer a breach, and you find yourself in the position of having to conduct digital forensics? What now? Can you collect data yourself? Where is your data? Who else has had access to your data? Is the provider the actual data holder or have they subcontracted? Many of these issues are better addressed before you enter the cloud. Failing that, what can you do?

Read more

Legal Issues of Cloud Forensics — Part 3

The use of cloud services has skyrocketed primarily because it is cheaper and more convenient than the alternative. Unfortunately, many companies have entered the cloud without first checking the weather forecast or performing a risk analysis. What happens if the cloud gets stormy, you suffer a breach, and you find yourself in the position of having to conduct digital forensics? What now? Can you collect data yourself? Where is your data? Who else has had access to your data? Is the provider the actual data holder or have they subcontracted? Many of these issues are better addressed before you enter the cloud. Failing that, what can you do?

Read more