Remove cyber-risk how-to-create-an-incident-response-plan-from-the-ground-up
article thumbnail

2022 Cyber Security Review of the Year

IT Governance

Social distancing restrictions were gone, masks disappeared and we made travel plans unfettered by fear of positive lateral flow tests. Although there have still been a few surprises, with the death of Queen Elizabeth II and blazing heatwaves across the UK to name but two, it was a familiar year in the cyber security landscape.

Security 132
article thumbnail

CyberheistNews Vol 13 #19 [Watch Your Back] New Fake Chrome Update Error Attack Targets Your Users

KnowBe4

Users can become desensitized to the potential risks bogus messages concerning IT issues carry with them. New school security awareness training can help any organization sustain that line of defense and create a strong security culture. The message displayed reads, "UPDATE EXCEPTION. An error occurred in Chrome automatic update.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

What’s the difference between a BCMS and a BCP?

IT Governance

Organisations and regulators don’t often agree on how businesses should be run, but lately both have championed the adoption of business continuity – a method that enables organisations to keep functioning during an incident, and address the prevention of and response to disruptions. What’s a BCMS?

Risk 56
article thumbnail

LW ROUNDTABLE: Cybersecurity takeaways of 2023 — and what’s ahead in 2024 ( part 1)

The Last Watchdog

A look back at the cybersecurity landscape in 2023 rings all-too familiar: cyber threats rapidly evolved and scaled up , just as they have, year-to-year, for the past 20 years. What should I be most concerned about – and focus on – in 2024? The comments we received were uniformly insightful and helpful. Avkash Kathiriya , Sr.

article thumbnail

Tuesday’s Relativity Fest 2019 Sessions: eDiscovery Trends

eDiscovery Daily

Let’s check out some of the sessions lined up for today (including the one I’m speaking at!). Join this lively and interactive session for a discussion about evolving standards and workflows in e-discovery and how they might be incorporated into a revised EDRM. It has provided a framework for the development of software and services.

article thumbnail

The Cathay Pacific Breach: Is Data Protection and Cyber Security Law in Hong Kong About to Receive an Upgrade?

HL Chronicle of Data Protection

Background. On 6 June, 2019, the Privacy Commissioner for Personal Data (the “ PCPD “) issued an enforcement notice against Cathay Pacific Airways (and its affiliate Hong Kong Dragon Airlines) (together, “ Cathay Pacific “) in respect of a data breach concerning unauthorized access to the personal data of some 9.4

article thumbnail

NEW TECH: CyCognito employs offensive bot network to put companies a step a head of attackers

The Last Watchdog

And yet, after a couple of decades of piling up layer upon layer of defenses, catastrophic breaches persist — they’re occurring as often as ever, and causing more harm than ever. Instead of offering up more layers of defense, they’ve slipped on the shoes of the attackers and taken an offensive approach to defending IT assets.