SECURE INSIGHTS - S3 BLOG

Home > News > Secure Insights – Blog

July 31, 2017

cyber-attacks READ MORE >

U.S. Government Steps in as Cyber Attacks Target Nuclear Plant

Hackers are no stranger to the energy division. Throughout history, cyber attacks have purposefully targeted the energy sector with intentions of espionage. In the latest incident, Wolf Creek Generating Station, a nuclear power plant located near Burlington, Kansas, was one of more than a dozen U.S. power operators to be penetrated by hackers. On June 28, the Federal Bureau of Investigation and U.S. Department of Homeland Security released an alert warning ...

July 10, 2017

malware READ MORE >

Recent Malware Attacks on Restaurants Use Stealthier Techniques

With all the improvements that have been made to security file scanners, creators of malware are deviating from the usual way to install it on a victim’s computer. This newer technique uses fileless malware, code that resides in computer memory and is written directly to RAM. It hides itself in hard-to-find locations where it goes effectively undetected by antivirus products. Besides being more difficult to detect, it is also harder ...

June 28, 2017

e-commerce READ MORE >

The Basics of Protecting Your E-Commerce Site

The increased growth and evolution of e-commerce in recent years has created a double-edged sword: Every innovation leads to a new security risk. Marketplaces are one of the top targets for fraud and hackers, but having a decent security protocol strengthens brand endurance and improves your customers’ experiences, reinforcing their trust in your business and leaving a long-standing impression after a cyber threat has been dealt with. If you are selling products ...

June 15, 2017

incident response READ MORE >

Why Fast Incident Response Is So Important

Cyber attackers are increasingly becoming more sophisticated and attacks more frequent. Organizations of all sizes and sectors are at risk, yet surprisingly, not everyone recognizes the risks or has plans in place to minimize the effects of an attack. According to the 2017 Cyberthreat Defense Report, the percentage of survey respondents hit by six or more successful attacks in the past year jumped to 32.9%. Those victimized more than 10 times ...

May 31, 2017

cyber-weapons READ MORE >

Canada Is Developing New Cyber Weapons in Response to Global Security Threats

Cyber threats aren’t just coming from super-smart hackers in basements anymore. They can be state-sponsored and far reaching with political motives. Take the 2015 attack on the Pentagon attributed to Russia. These cyber threats are changing the way countries defend themselves, and even military strategies in many countries. Even Canada, a neutral country, is beefing up its cyber arsenal. Canada’s Department of National Defence has announced that it will invest in the ...

May 15, 2017

ransomware-attack READ MORE >

“What is a Ransomware attack and what do I do if I get targeted?”

Every day, we hear in the news about more cyber attacks around the world. As ransomware in particular continues to evolve and become more sophisticated, more and more people and businesses will be attacked. It is critical to understand the threats, how to prevent attacks from occurring, and what to do if you are targeted. What is Ransomware? Ransomware is malware that cyber criminals use to hack into your device and hold ...

April 28, 2017

healthcare cybersecurity READ MORE >

A Call for Private-Public Partnerships in Healthcare Cybersecurity

A House Committee on Energy and Commerce hearing on healthcare cybersecurityshed light on the serious consequences of cyberattacks and the need for a multi-stakeholder solution. Positioning healthcare cybersecurity as a public safety issue affecting both patients and the digital citizen will enable government leadership to garner widespread support for cybersecurity progress. Healthcare Cybersecurity Protection – Confidentiality, Availability, and Integrity  Health care providers and cybersecurity experts have mainly focused on how to combat ...

April 20, 2017

cyber insurance READ MORE >

Board Members Turning to Cyber Insurance for Protection

Board members are turning to cyber insurance for protection from cyber-attacks. Is the strategy a sound one or should prevention remain the focus? According to Diligent Corporation's Dottie Schindlinger’s presentation at the NYSE Governance Services Cyber Risk Board Forum in February, 60% of board directors use personal email to communicate, 48% use their personal computers, tablets, or phones to download company documents, and 22% of them store information on their devices. ...

March 15, 2017

CIA data breach READ MORE >

Two essential lessons from the CIA data breach

In a data breach that is being described as catastrophic by national security experts, WikiLeaks released thousands of documents related to the agency’s digital espionage efforts. This trove of data included notes, conversations and even instruction manuals on how to bypass smartphones’ cybersecurity features and turn smart TVs into listening devices. But the story of the CIA data breach has two layers and two sets of lessons to learn. First, what can ...

March 1, 2017

data breach notification READ MORE >

Do you know your state’s data breach notification laws?

Most companies know what to do when there’s a data breach. But do they know how soon and to what extent they must notify the affected parties? Data breach notification laws vary a great deal state by state. Knowing what your data breach notification laws are is an important part of cybersecurity preparedness. Here’s a primer.   What is a Data Breach Notification Law? As if you didn’t have enough to worry about following ...


POPULAR POSTS

Mon , 31 Jul 2017

U.S. Government Steps in as Cyber Attacks Target Nuclear Plant

Hackers are no stranger to the energy division. Throughout history, cyber attacks have purposefully targeted the energy sector with intentions ... READ MORE >

Mon , 10 Jul 2017

Recent Malware Attacks on Restaurants Use Stealthier Techniques

With all the improvements that have been made to security file scanners, creators of malware are deviating from the usual ... READ MORE >

Wed , 28 Jun 2017

The Basics of Protecting Your E-Commerce Site

The increased growth and evolution of e-commerce in recent years has created a double-edged sword: Every innovation leads to a ... READ MORE >



SEARCH INSIGHTS

RESOURCES
BECOME A CLIENT
DOWNLOAD BROCHURE

To learn more about us, call Specialized Security Services, Inc. at 972.378.5554 and speak to one of our Security Professionals today!