February’s cyberattack on aerospace precision parts manufacturer Visser Precision in Denver, Colorado brings about new pressures on the supply chain brought on by DoppelPaymer ransomware. Rather than encrypting a victim organization’s data and demanding a...
Data Breach
The Clock is Ticking …It’s Time to Focus on Maturing Vendor Risk Management Programs
Tick Tock. It’s that time of year again. Summer’s heat waves are retreating, school is in session, and budget planning is well underway for 2019 and beyond. Each year organizations typically take focused time during Q3/Q4 to evaluate their strategic plans; monitor the...
The Fraud Implications of Weak Third Party Risk Management
By Bob Jones, Senior Advisor, The Santa Fe Group There are three different aspects of fraud that are relevant to third parties. The first is defalcations by the third party’s employees exploiting inadequate internal controls. The second is fraud perpetrated by...
It’s a New Day for Payment Card Fraud Liability
According to the global 2015 Cost of Data Breach Study by the Ponemon Institute, the average total cost of a data breach for the participating companies increased 23 percent over the past two years to $3.79 million. Now breach costs are likely to rise further as banks...
Experts Predict Security and Privacy Trends for 2016
Originally posted by ID Experts Blog. Reposted with permission. 2015 was a challenging year for defenders of privacy and security. For the first time, cyber-attacks became the leading cause of data breaches, as indicated by several annual data breach studies,...
Are You at Risk of a Data Breach? This Infographic Will Help You Prepare
Data breaches are a significant business threat across every industry; no one is immune. The impact of a data breach on a financial institution, however, can be particularly grievous, and the threat is only likely to grow in 2016. According to data from the Identity...
Target Reaches Settlement with Banks
Two years after the event the full cost of the Target breach is coming into sharper focus. In addition to a $900 million dollar revenue decline in the 4th quarter of 2013 (versus 2012), the loss of any possible revenue growth in the 2013 holiday season, legal costs,...
The Dangers of Forgotten Data
Just about every business works with masses of data every day, much of which is used and then filed away and forgotten. Gartner calls this forgotten data “dark data,” and defines it as “information assets organizations collect, process and store during regular...
Starwood Breach Not Isolated
Tracy Kitten, Executive Editor for Bank Info Security, today released an article about the recent Starwood breach. In the article, Tracy discusses how this incident may not be isolated and that "fraud patterns indicate that another, perhaps larger, breach is impacting...
Bend, But Don’t Break: How to Minimize the Effects of a Privacy Breach
By Elena Ames, Deluxe Corporation Reposted with Permission. Originally posted on Deluxe Blogs. Last week, my colleague Brad Reimer posted a great privacy blog on his recent attendance at the 2015 Privacy. Security. Risk. (P.S.R.) IAPP conference. Protecting sensitive...