<img height="1" width="1" style="display:none;" alt="" src="https://dc.ads.linkedin.com/collect/?pid=585074&amp;fmt=gif">

OUR BLOG

What is the Impact of GDPR on Financial Institutions?

Posted by Keith Shaffer Dec 3, 2018 1:12:35 PM

The General Data Protection Regulation (GDPR) accepted on May 28, 2018 by the EU has strengthened privacy laws concerning the processing of personal data. Businesses need to understand how this impacts them and if compliance is needed, in order to avoid potential risk.

Read More

Topics: Cyber Security, GDPR

Data Breach Scenario: Malicious Software - Financial Services Firms

Posted by Keith Shaffer Nov 13, 2018 4:00:11 PM

According to research from the Verizon RISK Team, few breaches are unique, meaning the vast majority of incidents are caused by a small number of scenarios. Verizon classifies 18 different data breach scenarios into four groups; the human element, conduit devices, configuration exploitation and malicious software. For the purposes of this article, we will focus on the malicious software that makes institutions vulnerable.

Read More

Topics: Cloud Computing, Cyber Security, Network Safety, Malicious Software, Data Breach

Data Breach Scenario: The Human Element - Financial Services Firms

Posted by Keith Shaffer Nov 13, 2018 3:32:18 PM

While the news sensationalizes cyber threats from bad actors and nation states, the reality is that the largest threats to organizations are their own employees and contractors. Humans are vulnerable and prone to fall victim to schemes aimed at gaining access to company networks. For their part, the hackers are sly and cunning and know how to take advantage of the weak link. When organizations take the initiative to learn about common data breach scenarios, they can better prepare and protect themselves.

Read More

Topics: Cyber Security, Data Breach

Data Breach: The Importance of Protecting Your Customer Data - Financial Services Firms

Posted by Keith Shaffer Nov 8, 2018 1:47:37 PM

In today’s digital world, customer data is one of the most valuable currencies. Unfortunately, that makes it an incredibly attractive target for hackers, phishers, and other cyber criminals. In fact, an estimated 158,727 pieces of customer data are stolen every single hour.

Read More

Topics: Data Breach, Data Protection

Data Breach Scenario: BYOD - Financial Services Firms

Posted by Keith Shaffer Nov 6, 2018 2:03:43 PM

What would happen to your brand trust if a personally owned device containing both personal and corporate data was lost or stolen?

Brand trust is paramount to the success and longevity of your business. While the creation of a separate interface for personal device traffic may seem inconvenient, it could prove to be one of the best security practices you implement.

Companies around the globe have identified the convenience of employees bringing their own device (BYOD) to work. In fact, 82% of companies allow the use of personal devices for work, but out of those companies which support BYOD, 50% were breached through an employee’s personal device.

Read More

Topics: Cyber Security, Network Safety, Internet of Things (IoT), Malicious Software, Data Breach