Hospitality Breaches

Author(s):

Josh Henry, ,

Hospitality Breach picture of Courtyard Marriott

Leaving the Light on for Everyone Hospitality breaches are the newest target for bad actors. Data breaches are making headlines more and more. As a result, large corporations in the hospitality industry are acquiring large targets on their back. Of course, this is no surprise. In fact, this problem has escalated since last year. Needed … Read more

IOT Devices- Information Outsourcing Terror

Author(s):

Josh Henry, ,

Iot Device Alexa against a blue background, speech bubble with gears.

IoT Devices are on the Rise A rising trend in consumer markets today are the virtual assistant such as Amazon’s Echo or the Google mini. Juniper Research predicts that 55% of homes in the U.S. will feature an IOT device by 2022. This ushers in a debate regarding the privacy and security of your information. … Read more

Dark Web: Unpacking the Notoriety

Author(s):

Caleb Townsend, Staff Writer, United States Cybersecurity Magazine

Dark Web Silk Road anonymous marketplace drugs index

If you are internet savvy, or into Creepypastas, you absolutely have heard of the dark web. What started out as a little trivia fact (did you know 99% of the internet is The Deep Web?!) has morphed into something else entirely. The Legend of the Dark Web Because the dark web is non-indexable, Google can … Read more

From the Summer 2016 Issue

Cyber Attacks and Legal Malpractice

Author(s):

Ethan S. Burger, Adjunct Professor, Washington College of Law

Over a year ago, Citibank criticized many of the largest law firms for their reluctance to: …discuss or even [publicly] acknowledge breaches that result [ed] in the release of their clients’, employees’, and counterparts’ confidential personal data, which has frustrated law enforcement and corporate clients for several years. That frustration bubbled over in an internal … Read more

From the Summer 2016 Issue

Cybersecurity Checkup: Preventing Breaches in Healthcare

Author(s):

Joseph S. Abrenio, Vice President of Commercial Services, Delta Risk LLC

The Evolving State of Healthcare Cyber-Attacks The healthcare sector has gone from being a secondary target for threat actors to landing squarely in the bullseye. In 2015, more than 100 million healthcare records were reportedly compromised, with five of the eight largest healthcare breaches since 2010 taking place in the first six months of 2015. … Read more

From the Summer 2016 Issue

Outcome-Based Cyber Defense

Author(s):

Duane Wilson, Director of Strategic Cyber Initiatives, Sabre Systems Inc.

According to CNN Money, more than 317 million new pieces of malware – computer viruses or other malicious software – were created last year. This means nearly one million new threats were released each day. This has been the case since the Morris Worm incident of 1988, and is predicted to get worse.1 Traditional cybersecurity … Read more

From the Summer 2016 Issue

The New Top Ten in Cybersecurity: Things Have Changed Dramatically

Author(s):

T. Casey Fleming, Chairman and CEO, BLACKOPS Partners Corporation

FORGET WHAT YOU THINK YOU KNOW ABOUT CYBERSECURITY. The Internet was initially developed only as an electronic communication method. Security did not become a concern until many years later, as the Internet matured. As threats mounted, the industry’s answer was to develop new software and hardware products to defend the perimeter of the network. Each … Read more

From the Spring 2016 Issue

The Need for a Cybersecurity Neighborhood Watch

Author(s):

Rick Lipsey, Senior Strategic Cyber Lead, LMI

As crime rates rose in the early 1970s, Americans began coming together to improve the security of their neighborhoods. They established stronger communities, promoted pride, and built trust that brought members together to deter would-be criminals.  They exchanged ideas and best practices for securing their homes and protecting themselves. Collectively and individually, they developed a clearer … Read more

From the Spring 2016 Issue

Restoring Trust in Healthcare

Author(s):

Robert Lord, Co-Founder, Protenus, Inc.

As every medical student graduates from their M.D. program and formally attaches the prefix “Dr.” to their names, they recite the Hippocratic Oath. While this oath has undergone many revisions over the years, it continues to bind students to a centuries-old tradition of physicians and healers. While much of the Oath deals with the literal … Read more

From the Spring 2016 Issue

Read This Before You Get Hacked Again

Author(s):

Amanda Fortner, Managing Editor, United States Cybersecurity Magazine

Review: Hacked Again, Scott N. Schober, 2015 The cover of Scott N. Schober’s book, Hacked Again, informs us that “It can happen to anyone – even a cybersecurity expert”. While this tagline is clearly meant to grab a potential reader’s attention, it also happens to be true. The recent wave of high-profile data breaches confirms … Read more