Carey

About flashpoint

This author has not yet filled in any details.
So far flashpoint has created 10 blog entries.

The Acquired Breach: How to Spot Cyber Risk in Your Acquisition

2019-01-16T22:40:06+00:00January 16th, 2019|Categories: Cybersecurity news, Latest Publications|Tags: , , , |

Your company just acquired another business and things are great. Your market cap is growing, shareholders are happy, and teams are working hard. Then, you get a call that makes your stomach turn. Your team has uncovered an ongoing breach in the company you just acquired. Your world changes immediately. Think the acquired breach can’t [...]

Cybersecurity Planning – Part 2 – Needs, Compliance and Threat Analysis

2018-12-20T01:05:12+00:00November 27th, 2018|Categories: Latest Publications|Tags: , , |

In the first part of cybersecurity planning, we discussed the top-level alignment of your security strategy with “The 3 R’s”: -          What gets you Rich? -          What can Ruin your business? -          What is Required by regulators or customers? The 3 R’s are largely business drivers, not technology or security drivers. In part 2 of [...]

Planning for your Cyber-Safe 2019 – Part 1: Where do I begin?

2019-01-14T22:58:16+00:00November 26th, 2018|Categories: Latest Publications|Tags: , |

As the turkey is wearing off and the end-of-year shopping season is upon us, I think about all the businesses that will suffer breaches on Cyber Monday. In 2017, 75% of workers admitted they will shop online from work today according to Robert Half Technology. With the average single-product security solution (think Anti-virus) being only [...]

Op-Ed: The Orangeworm Attacks — Why You Should be Worried

2018-12-20T00:50:53+00:00May 10th, 2018|Categories: Cybersecurity + Healthcare, Latest Publications, Op-Ed|Tags: , |

In yet another cyberattack aimed at the healthcare industry, a hacker group named Orangeworm recently targeted healthcare orgs in the U.S., Asia, and Europe. The attacks were aimed at computers that control X-rays and MRI machines, in addition to other medical devices. Yikes. The Orangeworm attacks not only highlight vulnerabilities specific to the healthcare industry, but also [...]

AEONIAN Endpoint is a Comprehensive SaaS Security Tool for Your Business

2018-12-20T00:45:40+00:00May 9th, 2018|Categories: In the press, Latest Publications|Tags: , |

Introducing a Simple, Integrated, SaaS Security Tool Focused on the Social Good At a time when ransomware attacks occur every 40 seconds, and annual damages are forecasted to hit $11.5 billion, cybercrime poses a greater threat to businesses than ever before. Addressing this issue, San Diego-based ICE Cybersecurity developed Aeonian — a new type of endpoint [...]

2018 Winter Olympic Games Cyber Attack is No Laughing Matter

2018-12-20T00:42:52+00:00February 22nd, 2018|Categories: Cybersecurity news, Latest Publications|Tags: , , |

It didn’t take long for the 2018 Winter Olympics to be hacked. News of the first hack broke shortly after the Opening Ceremonies were majestically unveiled for U.S. viewers the evening of Feb. 9. What’s worth contemplating for cyber experts who track such threats was that the Winter Olympic Games cyber attack had its origins well before [...]

How Bad was the Equifax Data Breach?

2018-12-20T00:33:30+00:00February 16th, 2018|Categories: Latest Publications|Tags: |

New Information Shows the Breach Worse than First Reported How worried should you be about last year’s Equifax data breach? Very. That’s the warning for the more than 145 million Americans — nearly half the nation’s total consumers — whose personal data was compromised in what ranks among the largest and most significant cyber scourges [...]

Chinese Tech Companies Were the First to Know About the Intel Chip Flaw

2018-12-20T00:24:10+00:00February 2nd, 2018|Categories: Latest Publications|Tags: , |

A member of Google’s Project Zero Security Team discovered a flaw that affects computer processors built by Intel and other chipmakers. The initial discovery came a week before Intel planned to release information about the flaw, but not before Intel informed Chinese tech companies like Lenovo and Alibaba. Google’s Project Zero team has concerns about the [...]

3 Ways Ransomware Affects Healthcare Cybersecurity

2018-12-20T00:07:11+00:00October 6th, 2017|Categories: Cybersecurity + Healthcare, Latest Publications|Tags: , |

Ransomware encrypts files and effectively locks users out of their computers and data. Those behind this type of cybersecurity attack then ask for money - ransom - in exchange for your data. It is estimated that 7.4 million new malware programs will be released in 2017. That’s about 850 per hour. Most ransomware is delivered in an [...]

6 Cybersecurity Action Steps for Corporate Directors

2018-12-19T23:57:15+00:00October 2nd, 2017|Categories: Cybersecurity & board of directors, Latest Publications|Tags: , |

Equifax Cybersecurity Incident Response Under Investigation Equifax, one of the major credit reporting agencies in the U.S., reported a data breach Sept. 7 that affected 143 million consumers. The hack is one of the largest ever recorded and may have released personal details of an estimated 44% of the U.S. population. According to The Apache Foundation, makers [...]