article thumbnail

How to Comply with the U.S. Federal Trade Commission’s (FTC) revised Safeguards Rule

CyberSecurity Insiders

The rule was first introduced in 2002 and has been revised multiple times to keep up with evolving technology and security threats. Implement a Written Information Security Program Developing a Written Information Security Program (WISP) is a key element of protecting your customer’s data.

article thumbnail

Quantum computing brings new security risks: How to protect yourself

CyberSecurity Insiders

The average cost of a data breach reached an all-time high in 2021, and the attack vector grows larger by the minute. Quantum computing focuses on developing computer technology based on principles that describe how particles and energy react at the atomic and subatomic levels. What is quantum computing? How to protect yourself.

Risk 134
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

2020 Predictions: New Challenges for Data Privacy and the 5G Hackathon

Thales Cloud Protection & Licensing

Today’s innovations and technologies provide tremendous opportunities for enterprises. Along with innovation and technology proliferation, new challenges that will shape business during 2020. The importance of data and the power of being an insights-driven enterprise are increasing the amount of damage that data breaches can cause.

article thumbnail

As market for cyber insurance booms, watchdog calls for better data

SC Magazine

However, auditors argue there is growing evidence that mounting financial losses from years of payouts to ransomware actors or companies in the wake of a data breach may be taking their toll on insurers’ pocketbooks, leading them to reevaluate their coverage models.

article thumbnail

MY TAKE: New ‘cyberthreat index’ shows SMBs cognizant of big risks, ill-prepared to deal with them

The Last Watchdog

Interestingly, 61 percent of all SMBs and 79 percent of large SMBs believe cyberhackers have more sophisticated technology at their disposal than the SMBs’ own cybersecurity resources. “I The company got its start in 2002 in Gulf Breeze, Florida, as a two-man operation that set out to help small firms filter the early waves of email spam.

Risk 182
article thumbnail

Two Strategies You Can Use To Reimagine Cybersecurity Without Looking Like An Amateur

Jane Frankland

Now, this is important, because thanks to Covid-19, whether you know it or not, you’re now a part of a humungous test that’s shaking the foundations of society, business, and technology. It’s as if someone has literally taken a great big highlighting pen and run it over our people, processes and technologies. On 7 August, at 10.30

article thumbnail

Cybersecurity regulations: How do laws apply to your business?

CyberSecurity Insiders

It was enacted to prevent and mitigate identity theft, provide notice of security breaches, and enhance law enforcement assistance. Bush in 2002, was enacted to post the 9/11 attacks. to terrorism and relates to national security data. At this point, almost every state has data privacy laws.