70 percent of people say that they would stop doing business with companies following a data breach, but they are about to be engulfed in data breach reality with GDPR breach reporting as under-reporting of breaches is huge.
Learning by doing. If you don't have - and practice - a breach recovery plan, then a simulation exercise can demonstrate why you should have one, identify your weak spots, and encourage you to take action to plug the holes.
Most breaches we become aware of are caused by failure to update software components that are known to be vulnerable for months or even years.
Organisations experience a critical IT incident five times per month, with each costing £108,000, according to a new report based on a study conducted by research firm Quocirca on behalf of big-data company Splunk.
Deploying BitLocker is only a start to effective full disk encryption explains Mark Hickman adding that on-demand encryption/decryption must be made easy, even transparent for employees, or they to look for hacks.
GDPR: It's important to put data intelligence tools in place that will allow you not only to conduct an audit of the data you have collected in the past but also address compliance in the future says Rob Perry.
Ben Rafferty says one positive thing that can be taken from the Swedish Transport Agency outsourcing blunder is that your company can use this disaster to start a conversation about your own data handling and protection strategies.
Itay Glick runs through some of the protections and their effectiveness against becoming not just the victim of a data breach, but also an early casualty of swinging GDPR fines.
A recent study by SkyHigh Networks found seven percent of all Amazon S3 servers are exposed which may explain a recent surge of data leaks in the last few months including the information on 198 million American voters.
As organisations continue to embrace the benefits offered by diverse multi-cloud environments, it's essential that they're aware of how best to achieve both compliance and control says Peter Galvin.
Implementation of GDPR could potentially spell the end of almost one in five European businesses says Petter Nordwall, particularly if regulators come out swinging and impose maximum fines for data breaches.
One of the goals of Breach Detection Systems is to provide the most effective automated detection with minimal false positives, because excessive false positives cause "fatigue" in the incident responder explains Dr. Giovanni Vigna
PCI DSS compliance doesn't guarantee security, but half of PCI certified companies aren't compliant which does indicate vulnerability to cyber-attack. "It's not a project, it's a programme - something you need to maintain."
Cyber-security executives are speculating the HBO hack by "Mr. Smith" was the result of the intruder putting in a tremendous amount of effort to infiltrate the entertainment giant.
Attacks using code hidden in pictures are difficult to detect and increasing in frequency but protective measures will get better say researchers.
An attack on Italian bank, UniCredit, has led to the accounts of 400,000 loan customers being accessed.
In Case You Missed It: IoT home vulnerability; Cyber attacks cost £40 bn; Bupa insider data leak; dual malware vectors; Dow Jones data at risk
Vulnerabilities in the wallet.sol Ethereum wallet led to the theft of millions of pounds worth of the cryptocurrency by hackers.
Lloyd's of London has come through with a new report that will provide great clarity to cyber insurers
An insider has compromised health insurance company BUPA, exposing the records of 547,000 customers.
A Verizon third party vendor's misconfiguration a storage repository left the data of a potential six million customers out in the open last month.
Though the AA's shop was reportedly leaking payment card data, the motoring association did not alert customers.
A Northamptonshire games company has been fined, as an example that any, big or small, who break the rules will be dealt with accordingly says ICO.
Oliver Pinson-Roxburgh discusses the latest trend regarding data breaches as observed by Verizon; namely, the targeting of web applications in data breaches.
Microsoft has cast doubt on a CheckPoint report earlier this month which said that a piece of adware has infected nine percent of networks globally.
The US' second largest health insurer is to pay out the largest settlement ever for a data breach.
It would appear both need a lesson on password-hygiene: government ministers are re-using government credentials for social media accounts, and Virgin Media customers aren't changing their default router password.
Ten percent of small business owners and employees in the UK admit to having poor security habits. The surveyed individuals admitted to regularly sharing confidential files on personal devices or sending documents to their personal emails rather than work emails.
One of London's most prestigious universities is fighting off a ransomware infection, according to its information security team.
Verizon has finally acquired Yahoo, at a discounted price, after a deal marred by the admission that Yahoo had been subject to two of the largest breaches ever recorded.