New York is joining other US states in expanding its definition of a data breach to include unauthorized “viewing” of data. The amendment also expands the definition of private information.
All about Virtualization and Cloud Security | Recent Articles:
Software is powering much of the world today, from the largest computing machines to the smallest devices that can fit on a computer chip. That means there is a greater opportunity than ever for security breaches. As any end user knows, even the highest quality software can come with vulnerabilities.
Risk management firm LexisNexis Risk Solutions, in conjunction with Information Security Media Group (ISMG), recently announced the results of an online survey they conducted to identify current trends in healthcare cybersecurity. The survey is based on responses from more than 100 participants working within including hospitals, physician group practices and payers. The survey was conducted over the spring of 2019.
The cost of data breaches keeps increasing for companies, and new research indicates that the financial impact can continue to sap company coffers for years after the incident occurs. Released this week, the 2019 Cost of a Data Breach Report from Ponemon Institute showed that the average data breach now costs companies $3.92 million globally. This represents a 12% rise in breach costs over the last five years.
Costs associated with a data breach have surged this year to $3.92 million, according to IBM’s latest Cost of a Data Breach study. And more than a third of it stems from lost business.
As data protection authorities start to dish out GDPR-related fines, businesses in the US must learn to better communicate their data-handling practices to customers. The pressure is on for businesses to seed trust in their user base.
- Machine Learning enables network security solutions to enhance their ability to detect advanced, stealthy threats
- Bitdefender NTSA relies on semi-supervised machine learning to identify key patterns and trends in live data flows, with minimal human input
- New, specialized ML algorithms help detect attacks that use DNS and FTP services
With less than six months until 2020, experts forecast the industry will be struggling to secure over 20 billion devices from attacks. Cybercrime will never cease to be a money-making machine, with hackers already making trillions of dollars from stealing sensitive data, medical records, financial information and credit history.
The financial impact of cybersecurity breaches on companies in the UK has climbed to a whopping average of an annual £4,180 in 2019, nearly double 2017’s £2,450, according to a UK government survey conducted in winter 2018 and early 2019. The cost has risen significantly for companies that lost critical data or assets following a cyber incident or breach.
Companies worldwide expect to boost cybersecurity investments by 34% in the next fiscal year, after raising them 17% the current year, new research shows. The reason? More than one in 10 firms loses upwards of $10 million after falling victim to a cyber attack.
Phishing attacks strike again. Last week, Nemadji Research Corp., which does patient eligibility and billing services work for the Los Angeles County Department of Health Services, discovered that they’d been breached by a phishing attack. The attack enabled the criminals to gain access to the medical records of nearly 15,000 patients.
Cyber security pros often conceptualize a linear continuum of protection strategy: The left portion of the line represents security measures that tend to be more preventive of cyber threats, and the right portion represents more reactive approaches. In the early days of cyber security, it was believed that any shift to the right was a concession to the adversary. More recently, however, shifts right are often viewed as showing justified respect for the adversary.
No one wants to go to the doctor’s office. Well, I guess some people do. I’m certainly not one of them. But imagine going to the doctor and then watching in horror as the medical equipment or computers the teams of doctors are working on aren’t working. That, suddenly, the come under attack just as you are “going under the knife.”
The cloud-based approach is growing in popularity among businesses worldwide, with more enterprises feeling confident in making the shift. Yet they feel obliged to take a different path due to concerns about data security in cloud computing, according to 24% of them, as well as limited budgets and high costs (22%), according to a recent survey from Netwrix.
- Bitdefender announces controlled availability release of GravityZone Sandbox Analyzer On-Premises
- Improves targeted attack detection across multiple vectors with enhanced data security and privacy
- Integrates with Bitdefender and third-party solutions for complex workflows and automated response
In only three days, businesses big and small with customers in the European Union have been told to cough up a cumulated €315 million in penalties after failing to comply with the GDPR rulebook.
The market for AI in cybersecurity is expected to soar. According to the market research firm Markets and Markets, sales and support of AI software and services will reach $38 billion by 2026 — up from nearly $9 billion this year.
A combination of outdated computer systems, lack of investment, and a deficit of skills and awareness in cyber security is placing NHS hospitals at risk, researchers have warned.
After Russians used techniques such as spearphishing emails and troll farms to inundate social media and influence the 2016 US election, concerns that the 2020 election is up for similar compromise are increasing. US intelligence and officials from the Democratic party are concerned that “Donald Trump and a powerful Senate ally are downplaying these concerns and not doing enough to thwart interfering,” according to The Guardian.
Nine in 10 IT security professionals say their companies can improve their reputations by better protecting data, according to a Bitdefender survey. CISOs and their teams also admit a weak posture could have the opposite effect, as seen in countless headlines in recent years that have sullied corporate images following security breaches.
A few weeks ago, the U.S. federal bureaucrats from the NASA Office of the Inspector General’s audit division put together a thorough document detailing the security woes at NASA Jet Propulsion Laboratory (JPL). The details come together in a classic “what not to do” anti-case study that many security professionals are probably familiar with at this point. It’s a good read for security people interested in learning from the mistakes of others.
Fines don’t stop rolling when Facebook is involved. Italy’s data protection watchdog, Il Garante per la protezione dei dati, has just hit the tech company with a €1 million fine for mishandling user data following the Cambridge Analytica scandal, writes TechCrunch.
Preventative security technologies like firewalls and application blacklisting aren’t always enough to safeguard an organization’s IT infrastructure. Businesses often face internal threats, so a cybersecurity strategy must include tools and processes for rapid detection and response. However, strategies often don’t.