As more police departments are being hit by ransomware attacks, there are several issues to consider. Unfortunately, there is not a simple fix to the problem. First, if the hackers steal data as part of the ransomware attack and then sell or publish it, it could compromise investigations or expose witnesses to physical harm if […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
When insurance companies first started writing cyber risk insurance, it was unbelievably profitable. They were writing many policies and not processing many claims, so they were very happy. Over the last few years customers discovered that it did not make any sense to buy insurance and not make a claim when a bad event happened. […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
The UK Might Beat Us to Regulating MSPs In the US, anyone can become a managed service provider. Unfortunately, customers may think that comes with security, but usually it does not. The UK is about to create a legally binding cybersecurity framework for managed service providers. This may be the first step at forcing businesses […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Long before quantum computing becomes “main stream”, state actors will have access to it. In part, because they command large budgets; in part because it is important to them. Why do they care? Because, it will allow them to decrypt both communications that they intercept going forward and communications that they have intercepted in the […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
About ten days ago Ireland’s healthcare system was forced to shut down its computers due to a ransomware attack. Ireland’s health minister said the attack was having a severe impact on the health and social services. In today’s healthcare world, having doctors and hospitals run without computers means no patient charts and a very labor […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
The Center for Internet Security has, for years, built a list of recommended controls and sold tools to help you manage that. The controls are very IT centered and don’t really cover governance, but the controls can be a good piece of your information security strategy. For as long as I can remember, there were […]
Continue reading →
[DISPLAY_ACURAX_ICONS]