article thumbnail

Prepare for The Cyber Threat : What Executives Need to Know to Manage Risk

CTOvision

Available data suggest that 84% of corporations have malware on their networks. This post provides the views of the leadership team of Cognitio Corp , a consultancy with experience defending both government and commercial enterprises. However, this only closes a door that has already been opened and exploited.

Insurance 150
article thumbnail

InfoSec Policies and Standards: Some strategic context for those just diving into this world

CTOvision

The Health Insurance Portability and Accountability Act ( HIPAA ). Legal experts need to be consulted if you want to know what level of encryption is allowed in an area. CTO Cyber Security Access control Consultants Information security InfoSec Management Policy Security Security policy' The Sarbanes-Oxley Act ( SOX ).

Policies 268
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

North Korean Threat Actors Targeting Healthcare Sector with Maui Ransomware

SecureWorld News

The figure below shows Maui command line usage details: The report continues: "Embedded usage instructions and the assessed use of a builder is common when there is an operational separation between developers and users of a malware family. Implementing HIPAA security measures can prevent the introduction of malware on the system.".

article thumbnail

The Sony Hack in Context

CTOvision

As one pundit has pointed out, twice as many Americans have been married to Larry King as have contracted the Ebola virus, yet the public is terrified of Ebola while seemingly unconcerned by the fact that our society is now existentially dependent on a highly penetrated and grossly insecure technology.

article thumbnail

7 challenges facing CIOs and IT leaders in 2020

mrc's Cup of Joe Blog

The most obvious answer is pay a premium for the best talent, or hire consultants with modern skills. photo credit: JavadR via pixabay cc In case you’re unfamiliar, ransomware is exactly what it sounds like: Malware that holds your files ransom. How can you address this challenge? Of course, not many companies can afford this option.