Designing a proactive incident response plan | Survey: Hackers returning for 2nd ransomware payment | Resources to help US schools develop campus safety
June 14, 2022
Advancing the best guidance and learning in cybersecurity
An effective cyberincident response plan reinforces data security before a breach even occurs and protects the business from legal exposure, writes Varnum data privacy lawyer John Rolecki. Critical elements include building in predictability by standardizing crucial steps, getting the necessary data in place to fulfill legal requirements and regularly reviewing so the plan is up to date.
Northwestern MS in Information Systems Build the technical and managerial skills needed for a career in IT management. Expand your expertise and your network by engaging with a professional faculty of leading data science experts. Study online or on campus. Learn more.
Cyberattackers re-victimize 80% of businesses that pay the first time, with 68% of security professionals saying hackers have come back within a month with a higher demand, Cybereason reports.
The Cybersecurity and Infrastructure Security Agency offers the research-and leading-practices-based K-12 School Security Guide Suite to help school leaders plan for or improve campus security. The suite explains the concept of layers of physical security, and the Federal School Safety Clearinghouse's SchoolSafety.gov site offers additional safety information.
Panelists at RSA Conference 2022 heard a common theme from experts in data governance and privacy: Trust with customers must be rebuilt. That's against a backdrop of millions of connected devices coming online every day, noted panel moderator Dominique Shelton Leipzig.
More cybersecurity courses and training programs are emerging amid a shortage of professionals in the field and enormous demand. The Metropolitan State University of Denver, for example, has a Cybersecurity Center to train students, but data shows the demand is outpacing supply -- the ability of such programs to graduate enough students.
Build Your Cyber Maturity Did you know the CMMI Cybermaturity Platform from ISACA® aligns with multiple leading frameworks, including NIST? Schedule a demo to see how your enterprise can build cyber resilience with the CMMI Cybermaturity Platform.
While companies and practitioners have adjusted to the huge workplace shift that came in March 2020, more major changes could be on the horizon, and now is the time to consider all options for how to best manage cybersecurity teams in this new era. Find out more in this pandemic aftermath-focused edition of the ISACA Podcast.
A misconfigured server at Chennai-based Myeasydocs exposed records of over 57,000 Indian and Israeli students, vpnMentor researchers have found. The data could result in further malicious activity, such as identity theft or education-related fraud.
Tech expert RJ Leer of OnChain Crypto singles out three social media apps that might be risking user information: Snapchat, Facebook and Instagram. In the case of Snapchat, the app "stores unsalted hashes of passwords" and "also collects a lot of personal data from users, including their phone numbers and addresses."