Netizen Blog and News
The Netizen team sharing expertise, insights and useful information in cybersecurity, compliance, and software assurance.
Category: Security
-

Employing a diverse range of information security pros can help hospitals to more effectively relate to the enemies trying to attack them. Hiring a diverse range of infosec employees benefits hospitals in ways not often discussed. In addition to employment equality, for instance, cybersecurity teams comprised of people with varying backgrounds is one key to…
-

Fall is officially here, which means the return of delicious Oktoberfest beer, Halloween costume preparations, and pumpkin-spice everything. It also means that National Cyber Security Awareness Month is almost here. October is National Cyber Security Awareness Month, which is “designed to engage and educate public and private sector partners through events and initiatives to raise…
-

As we improve health care through connected technology, we also must protect it from the bad guys Imagine this text message shows up in your e-mail: “Dear Sam, We have complete control of your hospital’s telemetry network. Please remit $15,000 in bitcoin to our offshore bank immediately or we will disable communication on this network.”…
-

The worst lines ever spoken in thriller/horror movies are “I’ll be right back” and “What else could possibly go wrong?” In the first instance, the person speaking those words is probably not coming back, and the moment the second is said, something else goes horribly wrong. In the “what else could possibly go wrong, cybersecurity edition” category, particularly in…
-

The grocer, which Amazon.com bought in August, said it had been informed of unauthorized use of payment cards that had been used at in-store taprooms and restaurants. Whole Foods Market says it’s investigating a potential hack or theft of customer payment card information at in-store taprooms and restaurants. In a news release on Thursday, the…
-

SANTA FE, N.M. — A cybersecurity breach at Equifax exposed sensitive personal data – including Social Security numbers, birth dates and addresses – potentially impacting 143 million Americans. Hackers using the handle Dragonfly 2.0 reportedly targeted dozens of U.S. energy companies last spring and summer, gaining access to utility networks and, in some cases, control…
-

As we improve health care through connected technology, we also must protect it from the bad guys Imagine this text message shows up in your e-mail: “Dear Sam, We have complete control of your hospital’s telemetry network. Please remit $15,000 in bitcoin to our offshore bank immediately or we will disable communication on this network.”…
-

“So, how do I get my son back?” The famous line from Tom Mullen, Mel Gibson’s character in the 1996 flick Ransom, paints a clear picture of what we are dealing with today regarding cyberwarfare. But instead of our children being abducted, it’s our data that’s being held captive. Every 40 seconds a business falls…
-

The threat of outside hackers is not the only reason to implement cybersecurity practices. Thoughtful cybersecurity practices can protect a business’s trade secrets from theft by departing employees and competitors. And while media attention focuses on cybersecurity breaches for large companies, they are not the only targets. A recent survey found that over 50 percent…
-

It’s a no-brainer that it’s more cost effective to hire an expert than to recover from the damage a data breach may cause. Throughout history, whenever technology has advanced, there has always been a concurrent change in the way we live our lives and go about our business. For the most part, this co-evolution has been welcomed…