by iTrust | Apr 19, 2016 | Blog, Uncategorized
A cybercrime gang has been using new malware to target business customers of banks in the United States and Canada and steal millions of dollars, primarily from business accounts, researchers at the IBM X-Force security group warn. Read the...
by iTrust | Apr 5, 2016 | Blog, Uncategorized
Federal regulators have issued new guidance urging healthcare organizations and business associates to bolster their cyberattack defenses. The advice comes after several high-profile attacks, including one targeting MedStar Health that forced the 10-hospital system to...
by iTrust | Apr 5, 2016 | Blog, Uncategorized
How to get to that culture of openness is the problem. In general, Business has no wish to understand Security, that’s what it pays CIOs and CISOs to do. CISOs know and grapple with this problem all the time and the reality is that it will most likely be solved...
by iTrust | Apr 5, 2016 | Blog, Uncategorized
A new survey into cloud concerns undertaken by database security firm HexaTier provides no surprises: security risks (44%) followed by compliance and regulation (29%) are the two biggest factors preventing greater cloud adoption (although we are specifically talking...
by iTrust | Apr 5, 2016 | Blog, Uncategorized
Cyber insurance rates have dropped, thanks to a drop in major data breaches. The relative quiet in massive breaches has prompted insurers to lower insurance prices during first three months of 2016 for high-risk industries including retail and healthcare, according to...
by iTrust | Apr 5, 2016 | Blog, Uncategorized
One of the best pieces of security advice any computer expert can give you is to enable two-factor authentication for websites that support it. With password breaches so common nowadays, it could be the one thing that keeps hackers from stealing your identity online....
by iTrust | Apr 5, 2016 | Blog, Uncategorized
You could be next. Take a look at these examples of how a security consultant was recently hired to infiltrate a company’s buildings and networks – mirroring a crook’s social engineering attempts to get at sensitive personal and corporate data. This was all done...
by iTrust | Mar 30, 2016 | Blog, Uncategorized
It all depends upon your level of risk and how badly you want the data returned to you unharmed. Ransomware is obviously analogous to kidnapping, and dealing with the perpetrators can feel much like negotiating with a jumper standing on the edge of high-rise roof. The...
by iTrust | Mar 30, 2016 | Blog, Uncategorized
To thrive in the cloud era, CISOs must refashion their roles as business enablers, adopt automation wherever possible, and go back to the basics on security hygiene. We’re undergoing one of the biggest transformational changes in IT since the introduction of the...
by iTrust | Mar 30, 2016 | Blog, Uncategorized
As new security threats continue to emerge and security teams find themselves stuck in the cycle of piling on new products and policies each time they receive an alert notification, true functions of security programs get lost in the clutter. As melting snow and...