Rogue One. U.K. Supermarket Chain Morrisons Not Liable For Data Breach By Internal Auditor, UK High Court Says

Andrew Skelton was a senior auditor in the internal audit department of UK supermarket chain Morrisons. In July, 2013, Skelton was scolded by Morrisons for some minor misconduct. To get even, Skelton leaked payroll, banking and other data about 126,000 Morrisons employees first to an online accessible website, and then to several newspapers. The breach, forensics,…

Details

Managing Risk in the Era of Pandemic

Cyber Security is NOT about cybersecurity. It’s not about compliance with regulations. At the end of the day, cyber security is about identifying and managing risks. Risks associated with the use and misuse of technology. Risks associated with failing to protect data. Risks associated with doing too little. And risks associated with doing too much.…

Details

DR/BCP – TL:DR – Preparing for the Wrong Disaster is Better than Not Preparing At All

In the wake of the SARS CoViD-19 pandemic, news organizations have been interviewing so-called “preppers” – survivalists who have been preparing for some natural or man-made disaster by hoarding shelf-stabilized food, guns, underground bunkers, water, and backup electricity. The preppers are taking a victory lap essentially saying, “we told you so.” Not quite. You see,…

Details

Data Security for Telecommuters

The first day was like a snow day. Maybe sleep in late. Maybe handle a few hundred e-mails and phone calls. It was either very hectic, or very slow. It was anything but normal. By day three it has already gotten old. You’re not really into the telecommuting routine. You’re not quite “at home” but…

Details

COVID-19 and the Spread of Personal Information

Important News about COVID-19! That e-mail came from the Virginia EZ-Pass. In the past two weeks, if you are anything like me, you have been receiving hundreds of e-mails from vendors, suppliers, and third parties from Outback steak house to 1-800-CONTACTS telling you about their policies, plans or procedures for the coming zombie apocalypse that…

Details

My CORONA (Virus) – How To Survive With IT

In the wake of the COVID-19 pandemic companies are increasingly calling on employees to work from home. Hospitals, clinics, and doctor’s offices are preparing for massive infections, not only of patients but of healthcare workers. Colleges and Universities are sending students home en masse. Sporting events are considering playing in empty arenas. Airlines and other…

Details

Ransomware Response — A Better Way

On March 15, 2020, during the height of the COVID-19 pandemic, hackers attacked the Department of Health and Human Services (HHS) servers. In the past, computers belonging to hospitals, doctor’s offices, and other medical providers have been a particular target for ransomware purveyors who lock computers or files and demand the immediate payment of ransom…

Details

Cloud Range Lauded for Importance, Innovation and Ease of Use

CISOs Laud Vendor for Importance to the Business, Innovation and Ease of Use Security Current, the premier CISO knowledge-sharing community, today announced that more than 20 CISOs from across industries selected next-generation virtual cyber range and security operations simulation provider Cloud Range as the winner of the Security Shark Tank® during RSA 2020. In the…

Details

Flashback: Read this article on assessing whether your business can survive a pandemic written in Dec 2014 by Farhaad Nero who was VP of Enterprise Security at Bank of Tokyo-Mitsubishi at that time

Take the Test: Today Ebola, Tomorrow Who Knows? Can Your Business Survive a Pandemic? Read this article on assessing whether your business can survive a pandemic written in Dec 2014 by Farhaad Nero who was VP of Enterprise Security at Bank of Tokyo-Mitsubishi at that time   Pandemics are epidemics occurring on a scale that crosses international…

Details

BEC and Call – Business E-Mail Compromise Leads to Liability

When William Darby went to work as a securities broker in October of 2018, little did he know that he was going to not only have a bad day, but ultimately a bad career. Darby’s firm fell victim to an increasingly common form of attack — a Business E-Mail Compromise, or BEC attack. An unknown hacker…

Details