www.fortifyexperts.com

2017 Major Cyber Hacks and Attacks! Equifax and Deloitte are not the only ones…

Historical hacks come back to haunt, and fresh breaches bite our behinds If you thought last year’s breach of over three billion records (and then some) was bad, this year has seen its fair share of headaches. From hacks, attacks, ransoms, and even extortion attempts, we’re not done with the year yet and already we’ve…

Cyber security is critical for startups

5 Cyber Security Measures Every Startup Must Take

Cyber criminals find small businesses and startups more appealing because they are more vulnerable and prone to a security breach. Generally, they do not have the appropriate security tools, methods and security protocols in place like other bigger companies. In 2017, the number of data breach incidents reported in the U.S. are up over 700%…

Black Hat Lock

Navigating the cybersecurity doldrums in 2016 and beyond

October 17, 2016 By Kapil Venkatachalam – Republished from PE HUB While the broader SaaS stocks have recovered from Q1 lows, I couldn’t help but wonder why IT security companies haven’t bounced back [see Figure 1]. There is a lot of confusion and skepticism among investors, and they have good reason to be wary. The security…

Ransomware

Current FBI Stats on Ransomware. Attacks grow even when the walls are up.

Ransomware notes from by the FBI: Hackers are earning north of $70,000 a month on ransomware. [August 2016] 259% increase in ransomware from exploit kits in about six months! [Malwarebytes LABS, August 2016] Between April 2014 and June 2015, the IC3 received 992 CryptoWall-related complaints, with victims reporting losses associated with these ransomware incidents totaling…

The CFO’s Role in Cyber Security

Many finance chiefs are being called upon to help promote cyber security and identify threats. Steve Durbin – Original Article posted at CFO Magazine The importance of cyber security is no secret to anyone who watches the nightly news. Senior executives at businesses of all sizes understand all too well that today’s global economy is still…

Cyber Security Govt

FACT SHEET: What does a $19B Cybersecurity National Action Plan get you?

The President’s new Cybersecurity National Action Plan (CNAP) is building upon lessons learned from cybersecurity trends, threats, and intrusions.  This plan directs the Federal Government to take new action now and establishes new programs to help foster long-term improvements in the cybersecurity approach across the Federal Government, the private sector, and our personal lives. Here are the…

opg cropped

Hackers change chemical settings at water treatment plant

Hackers manipulated the programmable logic controllers that managed the amount of chemicals used to treat the water to make it safe to drink. NEW YORK — March 23, 2016 — Hackers breached a water company’s industrial control system and made changes to valve and flow control settings, Verizon revealed in its latest Data Breach Digest.…

PowerLine

First known hacker-caused power outage signals troubling escalation

Highly destructive malware creates “destructive events” at 3 Ukrainian substations. Highly destructive malware that infected at least three regional power authorities in Ukraine led to a power failure that left hundreds of thousands of homes without electricity last week, researchers said. The outage left about half of the homes in the Ivano-Frankivsk region of Ukraine…

Cyber

Lack of Skills Still Hamper Ability to Deliver Cybersecurity

A recent survey found that a lack of required professional skills is still hampering companies’ ability to deliver cybersecurity to meet their evolving needs. The Cyber Security Job Trends Survey for 2016 said that of the 435 senior-level technology professionals who completed the survey, 68 percent affirmed that there is a global shortage of skilled…

Networks

The state of cybersecurity: What 2016 will bring

By Gerard Bauer from:  SECURITY FEATURES With cybersecurity breaches dominating 2015’s headlines on a regular basis, it is clear that today’s organisations simply cannot defend against every threat. Savvy cybercriminals are continuing to find attack entry methods that bypass or defeat traditional security defences, so threats remain undetected until damage has been done. It’s astonishing…