How to Punish Cybercriminals

Schneier on Security

There are approximately 300,000 reported malicious cyber incidents per year, including up to 194,000 that could credibly be called individual or system-wide breaches or attempted breaches. This is likely a vast undercount since many victims don't report break-ins to begin with.

How to Predict Insider Fraud

Data Breach Today

How To 148

New Hacker Exploits and How to Fight Them

Data Breach Today

Dan Larson of Crowdstrike discusses some the new techniques hackers are using and how to fight them off Dan Larson of Crowdstrike on Battling New Attack Techniques Hackers are constantly developing new exploits, and updating defenses is not an easy task.

How To 165

How to Future-Proof the Critical National Infrastructure

Data Breach Today

Design Cyberattack Resilience Into Technology, Says Professor Prashant Pillai The challenge when designing technology for critical national infrastructure sectors is that it must be securable today and remain resilient to cyberattacks for decades to come, says cybersecurity Professor Prashant Pilla

How to Use FDA's Medical Device Cybersecurity 'Playbook'

Data Breach Today

aims to assist healthcare delivery organizations in responding to cybersecurity incidents involving medical devices. Julie Connolly, who helped develop the guide, explains how to use it A new "playbook" co-developed by the Food and Drug Administration and Mitre Corp.

How to Avoid Card Skimmers at the Pump

Krebs on Security

But according to police in San Antonio, Texas, there are far more reliable ways to avoid getting skimmed at a fuel station. Booth said the SAPD has yet to see a skimming incident involving newer pump models like the one pictured directly above.

How To 208

How to write a disaster recovery plan

IT Governance

All organisations experience disruptions, whether that’s from a cyber attack, IT failure, weather event or something else, and they need to be prepared. The longer it takes to address an issue, the more the costs will spiral and the harder it will be to recover.

How to lose your password

Thales Data Security

The tsunami of passwords that exist across every aspect of our digital life means that there’s a thriving underground industry of cyber-criminals trying to get at them. Equifax – I could go on, but you might want to play with this visualisation instead.

How to claim compensation for a data protection breach

IT Governance

Organisations need to be much clearer about what information they’re processing, what it’s being used for and how data subjects can review and request changes to their data. You might therefore prefer to make a claim directly.

How to Store Medical Records: Finding the Best Strategy

Record Nations

Medical records require thoughtful and careful handling due to the sensitive information they contain. When choosing how to store your medical records, you have several option. The post How to Store Medical Records: Finding the Best Strategy appeared first on Record Nations.

How to Prevent SQL Injection Attacks

eSecurity Planet

Your company's website does not have to be the next victim of a SQL injection breach. Here's how to prevent SQL injection attacks

How To 113

How to Secure ‘Permissioned’ Blockchains

Thales Data Security

Permissioned blockchains are growing in popularity as businesses attempt to cash in on the blockchain trend while keeping a firm hand on the tiller. The post How to Secure ‘Permissioned’ Blockchains appeared first on Data Security Blog | Thales e-Security.

How to create a business continuity plan – with free template

IT Governance

Comprehensive BCM (business continuity management) measures are essential for responding effectively to a disruption and providing a minimum acceptable service during a disaster. Details of how and when the BCP will be invoked.

How to Use the NIST Cybersecurity Framework

Data Breach Today

Specific Actions for Organizations to See Success in their Cybersecurity Programs By focusing on the cybersecurity actions, NIST CSF can be flexibly deployed regardless of the setting or industry

How to manage inactive records collections

TAB OnRecord

At some point, space limitations and growing record volumes force organizations to deal with documents that aren't used very often. The most common approach is to send inactive files to an offsite storage environment, which frees up room for business operations and for… Read More.

How to Control What Websites Can Do on Your Computer

WIRED Threat Level

If you're not careful, websites can grab all kinds of permissions you don't realize or intend. Take back control in your browser. Security

Strong, streamlined and secure: How to get the most out of centralized key management

Thales Data Security

With organizations around the world now deploying ever-increasing amounts of encryption solutions in an effort to ward off cybercrime, businesses are facing a combination of challenges. Using algorithms to encode data as ciphertext, encryption acts as a safety blanket for data.

How To Protect Yourself From Hackers

Cyber Info Veritas

Would you like to know how to protect yourself from the ever-present threat of cybercrime perpetrated by black hat hackers? Their main aim is to exploit your “mistakes and vulnerabilities” to blackmail you into sending them money or they’ll leak your private data.

How to Improve Governance, Risk and Compliance

eSecurity Planet

VIDEO: Alissa Johnson, CISO at Xerox and former Deputy CIO at the White House, outlines compliance steps that could help all enterprises

Video 69

How to prepare for a penetration test

IT Governance

Rather, it requires a lot of skill and experience, as testers need to know what vulnerabilities to look for, where to find them and how to exploit them. All testers should follow a series of steps to guide them through the process, which we’ve outlined here.

How to Control API Security Risks

eSecurity Planet

Plugging critical vulnerabilities and using API security products are the best ways to manage API security risks

Risk 64

How to build your future success and lift everyone up

OpenText Information Management

When we’re young, we’re often told that we can be anything we want to be. We’re told that if we work hard enough, we have the power and ability to achieve our dreams — whatever they might be.

How to Safely and Securely Dispose of Your Old Gadgets

WIRED Threat Level

Keep your data private and the environment protected. Security

Data 70

Creating a Records Management Program: How to Balance Your Priorities

Record Nations

The best way to set these priorities is to evaluate your own processes. The post Creating a Records Management Program: How to Balance Your Priorities appeared first on Record Nations.

How to Check If Your Facebook Account Got Hacked—And How Badly

WIRED Threat Level

Here's how to see if you were affected. Facebook Friday offered more details about its recent breach. Security

How to implement a GDPR staff awareness training programme

IT Governance

When organisations look to initiate a GDPR compliance programme, the ‘people’ factor is often overlooked. To help you get started with your GDPR staff awareness training, we’ve highlighted our top seven tips for ensuring your programme is a success. .

How to implement a GDPR staff awareness training programme

IT Governance

When organisations look to initiate a GDPR compliance programme, the ‘people’ factor is often overlooked. To help you get started with your GDPR staff awareness training, we’ve highlighted our top seven tips for ensuring your programme is a success. .

Cryptocurrency Miners: How to Shield Browsers From Bad Guys

Data Breach Today

Browsealoud Subversion Points to Larger Trust Issues With Third-Party Code Attackers recently snuck cryptomining code onto thousands of websites by inserting it into a third-party accessibility plug-in called Browsealoud.

Threat Hunting: How to Evolve Your Incident Response

Data Breach Today

Tom Field and Ben Smith of RSA Security reflect on key findings from their recent Executive Roundtable on threat hunting

How To 100

How to improve the efficiency of your physical records storage

TAB OnRecord

Is it designed to enhance retrieval time and speed information access? The post How to improve the efficiency of your physical records storage appeared first on TAB Records Management Blog | TAB OnRecord. Could you be using you space more effectively?

How to Secure US Elections - Before It's Too Late

Data Breach Today

Two cybersecurity veterans detail the specific steps the Trump administration must take now if it has any hope of safeguarding the U.S. midterm elections in November against Russian interference, whether via hack attacks or social media and propaganda campaigns

How to Preserve Your Old Documents While Growing Digitally

AIIM

On one hand, you need to keep them stored away so that they don’t obstruct your daily work and clutter up the workspace. On the other, however, when you do need the documents, you need to be able to locate them quickly and not waste hours trying to figure out where they might have ended up.

Threat Hunting: How to Evolve Your Incident Response

Data Breach Today

Tom Field and Ben Smith of RSA Security reflect on key findings from their recent Executive Roundtable on threat hunting

How To 100

Four space planning mistakes (and how to avoid them)

TAB OnRecord

How do we make the most effective use of space? This is a continual challenge for records managers, who are often under pressure to accommodate more documents in a fixed or shrinking storage footprint. To help you… Read More.

How to reduce costs during a corporate file move

TAB OnRecord

The post How to reduce costs during a corporate file move appeared first on TAB Records Management Blog | TAB OnRecord. Along with mergers and acquisitions, corporate moves are one of the biggest challenges a records management team can face.

How to Stay Safe on Public Wi-Fi

WIRED Threat Level

Connecting to a public Wi-Fi network can put you at risk. Here's how to minimize the damage. Security

Risk 65

How to assess your physical filing practices and identify any issues

TAB OnRecord

The following questions are designed to help diagnose how your organization uses and stores information. The post How to assess your physical filing practices and identify any issues appeared first on TAB Records Management Blog | TAB OnRecord.

How to perform a comprehensive vulnerability assessment

IT Governance

Penetration testers use them to review target systems and identify potential attack vectors, weaknesses and entry points, while administrators use them to identify previously unknown or unidentified vulnerabilities that may affect their security infrastructure.

How to start implementing artificial intelligence

Information Management Resources

A bottoms-up, grassroots approach can kick-start the use of advanced technology by gaining experience with proof-of-concept pilots. Artificial intelligence Machine learning Data management

How to Budget For Your Company’s Technical Debt

AIIM

While “technical debt” is a term that’s frequently used by technologists, the implication and understanding of it tends to be opaque to the business until it’s too late - just look at how Nokia lost the mobile market that it helped create.

How to write a GDPR privacy notice – with documentation template example

IT Governance

For all processing activities, you must decide how data subjects will be informed of your privacy policy. Privacy notices can be issued in stages, but it is often easiest to direct data subjects to your privacy policy on your website. How do you write a GDPR privacy policy?

How to become a certified DPO

IT Governance

The EU GDPR (General Data Protection Regulation) requires certain organisations to appoint a DPO (data protection officer) to help them comply with the Regulation. The GDPR stipulates that DPOs should have appropriate experience and qualifications to fulfil the role.

CaCPA – How to Hit a Moving Target

InfoGoTo

Companies, consultants, and privacy professionals have been pouring over the law and monitoring amendments to it so they can assess the impact to operations, understand the financial implications, and formulate a plan to meet the “final” requirements of the law.