Thought Leadership

#CyberAware Month: Malware 101

#CyberAware Month: Malware 101

Malware is a term that refers to malicious software, a type of malicious code that is used to create data breaches, damage a computer system or network, bypass access controls or otherwise cause undesired effects to a host computer. Malware can take the form of executable code, scripts, active content, and other software. Among the most common types of malware are adware, bots,... Read More
October 29, 2015
How Cybersecurity Aware Are You? #CyberAware

How Cybersecurity Aware Are You? #CyberAware

Did you know that 95% of all security incidents involve human error?1 Successful security attacks are often the result of  insiders within an organization unwittingly providing attackers with access to sensitive information. Best of breed security technologies cannot help protect your organization unless employees understand their roles and responsibilities in safeguarding sensitive data and protecting company resources. Cybersecurity is no longer an issue for employers and business owners, recent hacks... Read More
October 19, 2015
Payment Card Industry (PCI) Awareness Week #CyberAware

Payment Card Industry (PCI) Awareness Week #CyberAware

President Obama has designated October National Cybersecurity Awareness Month. This week, we will be shining a spotlight on the payment card industry (PCI). Every time your customers make a purchase, they are trusting that you will not only deliver your product or service, but that you will keep their personal information safe. The threat of credit card fraud and information theft across... Read More
October 13, 2015
SEC Announces Cybersecurity Policy Enforcement #CyberAware

SEC Announces Cybersecurity Policy Enforcement #CyberAware

President Obama has designated October as National Cybersecurity Awareness Month. This week, we will be shining a spotlight on cybersecurity examinations for businesses and business owners. Herjavec Group is sharing a summary of the SEC’s latest release where the commission highlighted the six target areas for its future cybersecurity examinations. All businesses should be #CyberAware In late September, the Securities and... Read More
October 6, 2015

To Cyber-Insure, or not to Cyber-Insure…that is the Question

Steven Cohen, VP Herjavec Group Last week BitPay filed a lawsuit against insurer MBIC to recover amounts denied under a commercial crime policy. It has been reported that in December 2014, hackers were able to pull off a social engineering attack against a BitPay executive, resulting in 3 separate transfers of 5,000 bitcoins (valued at $1,850,000). This incident is particularly... Read More
September 25, 2015

How to Manage Ransomware

Matt Anthony VP, Incident Response Many organizations are victims of an emerging and surging category of malware.  Generically called ransomware, it is also known by the names Cryptolocker or Cryptowall.  Ransomware evolves and changes, but the result is the same.  You start your computer and get a message like:  “Your files are encrypted” along with an invitation to pay a ransom,... Read More
September 8, 2015

Legislative Intervention into Security Preparedness

Steven Cohen, VP Herjavec Group  Last week a US appeals court confirmed that the Federal Trade Commission (FTC) can proceed with its suit against the Wyndham hotel chain. Wyndham was accused of failing to secure customer information and prevent multiple breaches between 2008-2009. The breaches reportedly resulted in 619,000 credit card accounts being compromised and over $10million in losses. Following... Read More
August 31, 2015

Cybersecurity Awareness Training: Simple Solutions to Complex Problems

Cybersecurity is certainly topical given the number of compromises being reported in the press. As cybersecurity professionals, it can be perplexing to see organizations that focus their efforts on investments in the technology space, while often ignoring and undervaluing the investment in their own people. Many firms offer security awareness training in the form of a quick PowerPoint presentation followed... Read More
August 19, 2015

Why AV is Dead, and what to do about it.

Scott McDonald, Herjavec Group In the proverbial cat-and-mouse game of cybersecurity neither the attacker nor defender can maintain their advantage for very long.  The lifecycle of new technologies in IT is very short. But in cybersecurity that time is condensed into nanoscopic increments of obsolescence allowing new lethal threats to overtake yesterday’s sophisticated cyber defenses. Let’s take a look ‘under... Read More
August 4, 2015

Protecting the Endpoint

As security leaders we recognize that endpoint protection is critical. Over 70% of attacks occur on the endpoint and we recognize that human error still accounts for the majority of desktop breaches. The cybersecurity industry has experienced a surge in the number of endpoint protection offerings available. Offerings exist for on prem or remote endpoint protection in terms of prevention,... Read More
July 6, 2015