Growth in cybersecurity investments expected to continue | Standard aims to boost cybersecurity in medical devices | Level 3 offers a cloud-based security service
Created for {EMAIL} | [Web Version]
May 26, 2016
[Â]
[Data Security & Privacy SmartBrief]
[SIGN UP] ⋅ [FORWARD] ⋅ [ARCHIVE]
Top Story
[Growth in cybersecurity investments expected to continue]
Cybersecurity investments jumped 78% in 2015 to $228 million and will likely reach $400 million this year, according to Lux Research. Threats to the Internet of Things, which includes smart homes and autonomous cars, are driving the boost in venture capital for the sector.
[ReadWrite] (5/19)
[LinkedIn] [Twitter] [Facebook] [Google+] [Email]
Data Security & Privacy
[Standard aims to boost cybersecurity in medical devices]
A cybersecurity standard known as DTSec, for network-connected smart medical devices, has been unveiled by the Diabetes Technology Society. DTSec, which uses an ISO/IEC 15408 framework to set security requirement definitions on smart devices, may also be used for networked electronic products and systems in other industries, said David Kleidermacher, chief security officer of BlackBerry and one of the standard's lead authors, in a statement.
[Healthcare IT News] (5/24)
[LinkedIn] [Twitter] [Facebook] [Google+] [Email]
- [Level 3 offers a cloud-based security service] Light Reading (5/25)
Cyber Risk
[LinkedIn tells users to update passwords]
LinkedIn is encouraging users to update their passwords following reports that a hacker is selling user information obtained in a 2012 data breach that affected more than 100 million users.
[Los Angeles Times (tiered subscription model)] (5/19)
[LinkedIn] [Twitter] [Facebook] [Google+] [Email]
[How to minimize unauthorized app use]
Many employees use unauthorized apps in the workplace, which could be creating cybersecurity risks, research shows. To minimize the problem, offer proper training, address issues that employees may have with authorized software and provide access to approved apps through a single platform.
[BusinessNewsDaily.com] (5/24)
[LinkedIn] [Twitter] [Facebook] [Google+] [Email]
By the Numbers
[FBI: Victims lost $1.6M from ransomware attacks in 2015]
Ransomware attacks cost victims $1.6 million last year, according to a report from the FBI Internet Crime Complaint Center. Losses from cyberattacks surpassed $1 billion, the report says.
[The Washington Times] (5/25)
[LinkedIn] [Twitter] [Facebook] [Google+] [Email]
Practice & Policy
[How is your business protected against a cyberattack?]
Half of small-business owners believe they're too small to be targeted by hackers, yet 40% of all attacks are on businesses with fewer than 500 employees, said Jeff Bardin, chief intelligence officer of Treadstone 71. He provided five questions for business to consider when trying to boost security, and cybersecurity expert Candy Alexander reminded entrepreneurs to change their passwords.
[New Hampshire Business Review] (5/25)
[LinkedIn] [Twitter] [Facebook] [Google+] [Email]
- [Lawyers: Understand how insurance can address cyberextortion] PropertyCasualty360 (5/19)
AllClear ID News
4 steps to respond more effectively after a data breach
The most thorough preparation pre-breach won't matter if your response team is derailed by emotions like denial, tunnel-vision and anger. [Download this whitepaper], Factoring the Human Element Into Your Data Breach Response, to learn which emotions are most likely to derail your team and steps you can take now to be ready to address them during a crisis.
[LinkedIn] [Twitter] [Facebook] [Google+] [Email]
Is your team ready for a data breach?
As data breaches increase in scale and frequency, businesses must prepare today to ensure an effective, customer-focused response. Consumers, regulators and the media want a well-orchestrated response launched just days after a data breach, and preparation in advance is critical to success. [Download this Incident Response Workbook] and learn:
- Key considerations for data breach preparation and customer notification
- Best practices for the customer-facing aspects of data breach response
- Recommendations for planning and executing a well-orchestrated response
[LinkedIn] [Twitter] [Facebook] [Google+] [Email]
Learn more about AllClear ID: [About AllClear ID] | [AllClear ID Breach Response]
[AllClear ID Resources]
Striving for success without hard work is like trying to harvest where you haven't planted.
David Bly,
politician
[LinkedIn] [Twitter] [Facebook] [Google+] [Email]
[Sign Up]
[SmartBrief offers 200+ newsletters]
Subscriber Tools:
[Manage Subscriptions]
[Update Your Profile]
[Unsubscribe]
[Send Feedback]
[Archive]
[Search]
Contact Us:
Editor - [Amanda Gutshall]
Mailing Address:
SmartBrief, Inc.®, 555 11th ST NW, Suite 600, Washington, DC 20004
© 1999-2016 SmartBrief, Inc.®
[Privacy policy] | [Legal Information]
Â