Experts offer tips to reduce cybersecurity risk | The importance of procedures for security reports | Expert: Financial advisers need cyberinsurance coverage
Created for {EMAIL} | [Web Version]
January 19, 2017
[Data Security & Privacy SmartBrief] [Data Security & Privacy SmartBrief]
[SIGN UP] ⋅ [FORWARD] ⋅ [ARCHIVE]
Top Story
[Experts offer tips to reduce cybersecurity risk]
Health care organizations seeking to reduce cybersecurity vulnerabilities should implement and practice plans for disaster recovery and contingency, train employees, hire forensic consultants, assess risk and choose business associates or vendors with proven security track records, experts say. "Many organizations are under the delusion they can detect and respond, and they're not layering their defenses," says James Scott of the Institute for Critical Infrastructure Technology.
[Healthcare IT News] (1/16)
[LinkedIn] [Twitter] [Facebook] [Google+] [Email]
Data Security & Privacy
[The importance of procedures for security reports]
[The importance of procedures for security reports]
(Adam Berry/Getty Images)
Customers and security researchers often find vulnerabilities in clients' systems, but many companies don't have a process in place to handle those security reports. Every website should have a security contact in place, as well as a procedure and an inbound email used for handling reports to ward off potential attacks and address system vulnerabilities, says security analyst Troy Hunt.
[CIO.com] (1/17)
[LinkedIn] [Twitter] [Facebook] [Google+] [Email]
[Expert: Financial advisers need cyberinsurance coverage]
A strong cybersecurity plan coupled with a cyberinsurance policy is the best way for financial-advisory firms to guard against the effects of cyberattacks, experts say. "Whenever you're handling the sensitive information of customers, you are at risk of a breach, and it can be quite costly," lawyer Katherine Dawson Varholak says.
[InvestmentNews] (1/15)
[LinkedIn] [Twitter] [Facebook] [Google+] [Email]
Cyber Risk
[Mobile devices don't pose significant risk for data breaches]
[Mobile devices don't pose significant risk for data breaches]
(Philippe Huguen/Getty Images)
Information from the Identity Theft Resource Center's database shows that mobile devices pose the smallest data breach threat. Companies should focus on securing laptops, external hard drives and cloud services using encryption to lower their risk of a breach, Galen Gruman writes.
[InfoWorld] (1/17)
[LinkedIn] [Twitter] [Facebook] [Google+] [Email]
- [Corporations need to increase focus on cyberrisks] Federal Computer Week (1/12)
By the Numbers
[Survey: Complex security policies put companies at risk]
Eighty-three percent of companies believe they're at risk for a cyberattack due to complexities in security requirements and policies, a Ponemon Institute survey has found. The study also found that data assets are increasing and more employees are putting information on personal devices, raising the risk of a data breach.
[Health Data Management] (1/16)
[LinkedIn] [Twitter] [Facebook] [Google+] [Email]
- [27M patients affected by 450 data breaches in 2016] BeckersHospitalReview.com (1/12)
Practice & Policy
[Pa. court finds no employer liability for hacked worker data]
Employees can't seek damages from their employers for security breaches that affect their personal data, the Superior Court of Pennsylvania has found. The court, basing its ruling on decisions in other cases, found that workers had no reasonable expectation that their data should be secure.
[Network World] (1/17)
[LinkedIn] [Twitter] [Facebook] [Google+] [Email]
[OPM: Progress made, but more IT funding needed after breach]
The Office of Personnel Management has made significant progress in data security and rebuilding its reputation since hackers accessed the personal data of almost 22 million people last year, said acting Director Beth Cobert. She added that more funding is needed for new IT infrastructure as part of a modernization effort.
[FederalNewsRadio.com] (1/16)
[LinkedIn] [Twitter] [Facebook] [Google+] [Email]
AllClear ID News
The most overlooked component of breach readiness
Today, most businesses have a breach response plan in place. What they don't realize, however, is that they have overlooked the most critical component of breach readiness: reserving the manpower required to execute their plan successfully. [Learn how your business can become truly response ready].
[LinkedIn] [Twitter] [Facebook] [Google+] [Email]
Learn more about AllClear ID: [About AllClear ID] | [AllClear ID Breach Response]
[AllClear ID Resources]
Every time man makes a new experiment, he always learns more. He cannot learn less.
R. Buckminster Fuller,
architect and inventor
[LinkedIn] [Twitter] [Facebook] [Google+] [Email]
[Sign Up]
[SmartBrief offers 200+ newsletters]
Subscriber Tools:
[Manage Subscriptions]
[Update Your Profile]
[Unsubscribe]
[Send Feedback]
[Archive]
[Search]
Contact Us:
Editor - [Amanda Gutshall]
Mailing Address:
SmartBrief, Inc.®, 555 11th ST NW, Suite 600, Washington, DC 20004
© 1999-2017 SmartBrief, Inc.®
[Privacy policy] | [Legal Information]
Â