Important Updates to the GLBA Safeguards Rule – How Might it Affect Your Company?
The Federal Trade Commission (FTC)
has been vaguely requiring financial institutions to use “reasonable” security controls since 1999. That is about to change. (more…)
What is Reasonable Cyber Security?
NetDiligence Cyber Risk Summit: What is Reasonable Cyber Security?
The panel provided an overview of the risk-based analysis process that substantiates the method, and presented the legal, regulatory, and security best-practice history that informs the method. Each participant presented why the method successfully substantiates the term “reasonable” in their work and provided anecdotes that illustrate how it has been used on (more…)
FTC Workshop to Examine Safeguards Rule
HALOCK partner, Chris Cronin, will be participating as a panelist in the FTC Safeguards Rule Virtual Workshop.
The session, “The Costs and Benefits of Information Security Programs” (more…)
The Current Challenge of Remote Work and Privacy
Prior to the pandemic outbreak, some 5.2 percent of U.S. employees worked remotely on a full time basis according to the U.S. Census. (more…)
Cyber Security Case Study: When Ransomware Attacks and You Don’t Have Documented Data Inventory
HALOCK partnered with a Manufacturing company to recover data exfiltrated from a ransomware attack (more…)
How Do You Secure New Technology?
Hackers are relentless adversaries who incessantly create new tools and methodologies to take advantage of known exploitable vulnerabilities within networks. (more…)
Cyber Security Case Study: Maintaining PCI Compliance
HALOCK partners with a research university to conduct a comprehensive PCI DSS project to ensure PCI compliance. (more…)
Cyber Security Case Study: Ransomware at a Manufacturing Company
HALOCK contained and eradicated a ransomware attack on a manufacturing company’s internal assets and set a wholistic plan to mitigate future risk through enhanced MFA, policies, and training. (more…)
A Summary of DBIR 2020 – Where the Data Breach World is Today and How to Prepare for IT
The annual 2020 Data Breach Investigations Report (DBIR) was recently released and we would like to summarize some of the key trends found in the report. The Report takes a granular look at threat actors (bad guys) and the tactics they used to carry out the breaches and security incidents of the last year. (more…)