SECURE INSIGHTS - S3 BLOG

Home > News > Secure Insights – Blog

June 15, 2017

incident response READ MORE >

Why Fast Incident Response Is So Important

Cyber attackers are increasingly becoming more sophisticated and attacks more frequent. Organizations of all sizes and sectors are at risk, yet surprisingly, not everyone recognizes the risks or has plans in place to minimize the effects of an attack. According to the 2017 Cyberthreat Defense Report, the percentage of survey respondents hit by six or more successful attacks in the past year jumped to 32.9%. Those victimized more than 10 times ...

May 31, 2017

cyber-weapons READ MORE >

Canada Is Developing New Cyber Weapons in Response to Global Security Threats

Cyber threats aren’t just coming from super-smart hackers in basements anymore. They can be state-sponsored and far reaching with political motives. Take the 2015 attack on the Pentagon attributed to Russia. These cyber threats are changing the way countries defend themselves, and even military strategies in many countries. Even Canada, a neutral country, is beefing up its cyber arsenal. Canada’s Department of National Defence has announced that it will invest in the ...

May 15, 2017

ransomware-attack READ MORE >

“What is a Ransomware attack and what do I do if I get targeted?”

Every day, we hear in the news about more cyber attacks around the world. As ransomware in particular continues to evolve and become more sophisticated, more and more people and businesses will be attacked. It is critical to understand the threats, how to prevent attacks from occurring, and what to do if you are targeted. What is Ransomware? Ransomware is malware that cyber criminals use to hack into your device and hold ...

April 28, 2017

healthcare cybersecurity READ MORE >

A Call for Private-Public Partnerships in Healthcare Cybersecurity

A House Committee on Energy and Commerce hearing on healthcare cybersecurityshed light on the serious consequences of cyberattacks and the need for a multi-stakeholder solution. Positioning healthcare cybersecurity as a public safety issue affecting both patients and the digital citizen will enable government leadership to garner widespread support for cybersecurity progress. Healthcare Cybersecurity Protection – Confidentiality, Availability, and Integrity  Health care providers and cybersecurity experts have mainly focused on how to combat ...

April 20, 2017

cyber insurance READ MORE >

Board Members Turning to Cyber Insurance for Protection

Board members are turning to cyber insurance for protection from cyber-attacks. Is the strategy a sound one or should prevention remain the focus? According to Diligent Corporation's Dottie Schindlinger’s presentation at the NYSE Governance Services Cyber Risk Board Forum in February, 60% of board directors use personal email to communicate, 48% use their personal computers, tablets, or phones to download company documents, and 22% of them store information on their devices. ...

March 15, 2017

CIA data breach READ MORE >

Two essential lessons from the CIA data breach

In a data breach that is being described as catastrophic by national security experts, WikiLeaks released thousands of documents related to the agency’s digital espionage efforts. This trove of data included notes, conversations and even instruction manuals on how to bypass smartphones’ cybersecurity features and turn smart TVs into listening devices. But the story of the CIA data breach has two layers and two sets of lessons to learn. First, what can ...

March 1, 2017

data breach notification READ MORE >

Do you know your state’s data breach notification laws?

Most companies know what to do when there’s a data breach. But do they know how soon and to what extent they must notify the affected parties? Data breach notification laws vary a great deal state by state. Knowing what your data breach notification laws are is an important part of cybersecurity preparedness. Here’s a primer.   What is a Data Breach Notification Law? As if you didn’t have enough to worry about following ...

January 30, 2017

Penetration Testing READ MORE >

Cybersecurity Penetration Testing: Why Your Business Needs It

Penetration testing is used throughout the Information Technology industry to determine the level of vulnerabilities present in a particular system or network. Depending on the security needs and risks facing the target, a penetration test may be focused on a specific goal or used to test general strategic defenses against cyberattacks. These tests are usually performed by third-party security firms or auditing companies to ensure that the test is conducted ...

January 15, 2017

Cybersecurity Threats READ MORE >

Cybersecurity Threats to Watch for in 2017

Cybersecurity threats will continue to remain at the forefront of the information technology industry for 2017. From international data breaches to individual ransomware attacks, threats to computer systems will have an impact on every aspect of modern life. Here are five areas to watch in the cybersecurity field this year. Cybersecurity Threats and the Internet of Things Often referred to as the IoT, this network of connected devices controls climate control units, ...

December 29, 2016

Cybersecurity Risk Assessments READ MORE >

Healthcare Cybersecurity Risk Assessments: Protecting Data & Patients

The specialized needs of the healthcare industry can complicate the implementation and execution of cybersecurity operations. Healthcare enterprises are responsible for protecting reams of confidential patient data, and breaches can affect not only that data but potentially the patients’ lives themselves. In order to properly balance workflow operations and security, it is essential for those developing cybersecurity measures to fully understand the needs of the clinicians and the relative risk ...


POPULAR POSTS

Thu , 15 Jun 2017

Why Fast Incident Response Is So Important

Cyber attackers are increasingly becoming more sophisticated and attacks more frequent. Organizations of all sizes and sectors are at risk, ... READ MORE >

Wed , 31 May 2017

Canada Is Developing New Cyber Weapons in Response to Global Security Threats

Cyber threats aren’t just coming from super-smart hackers in basements anymore. They can be state-sponsored and far reaching with political ... READ MORE >

Mon , 15 May 2017

“What is a Ransomware attack and what do I do if I get targeted?”

Every day, we hear in the news about more cyber attacks around the world. As ransomware in particular continues to ... READ MORE >



SEARCH INSIGHTS

RESOURCES
BECOME A CLIENT
DOWNLOAD BROCHURE

To learn more about us, call Specialized Security Services, Inc. at 972.378.5554 and speak to one of our Security Professionals today!