Cyber Incidents are Increasing. Are You Covered?
Cyber-attacks happen. And they are happening more frequently and leaving more damage in their wake. What can you do to minimize that impact? (more…)
There’s Been an Incident! What’s the Plan?
2020 has been quite a year so far, surfacing security vulnerabilities many were unprepared for. Cyber attackers took advantage of new remote working environments as well as our fear and uncertainty due to COVID-19, and hit our networks hard. (more…)
FTC Workshop on GLBA Safeguards Rule
Seeking input on proposed changes to the Gramm-Leach-Bliley Act’s Safeguards Rule, the Federal Trade Commission (FTC) conducted (more…)
Important Updates to the GLBA Safeguards Rule – How Might it Affect Your Company?
The Federal Trade Commission (FTC)
has been vaguely requiring financial institutions to use “reasonable” security controls since 1999. That is about to change. (more…)
What is Reasonable Cyber Security?
NetDiligence Cyber Risk Summit: What is Reasonable Cyber Security?
The panel provided an overview of the risk-based analysis process that substantiates the method, and presented the legal, regulatory, and security best-practice history that informs the method. Each participant presented why the method successfully substantiates the term “reasonable” in their work and provided anecdotes that illustrate how it has been used on (more…)
FTC Workshop to Examine Safeguards Rule
HALOCK partner, Chris Cronin, will be participating as a panelist in the FTC Safeguards Rule Virtual Workshop.
The session, “The Costs and Benefits of Information Security Programs” (more…)
The Current Challenge of Remote Work and Privacy
Prior to the pandemic outbreak, some 5.2 percent of U.S. employees worked remotely on a full time basis according to the U.S. Census. (more…)
Cyber Security Case Study: When Ransomware Attacks and You Don’t Have Documented Data Inventory
HALOCK partnered with a Manufacturing company to recover data exfiltrated from a ransomware attack (more…)
How Do You Secure New Technology?
Hackers are relentless adversaries who incessantly create new tools and methodologies to take advantage of known exploitable vulnerabilities within networks. (more…)