All modern vehicles are vulnerable to cyberattacks; particularly as “smart cars” become more prevalent, hackers have greater opportunities to penetrate, control, and steal information from vehicle systems. Learn about the types of cyber attacks that are prevalent with smart cars and what you can do to avoid them.
Resource Search
Remote work, IoT devices, and new technologies create risk for your personal data at home. Learn how you can mitigate these risks with this infographic.
This checklist and visual representation of a home is a helpful guide on how to protect your privacy while working from home. These simple tips can be a difference maker.
Board oversight is critical in the management of cybersecurity as a whole, but especially for ransomware, since the increase in attacks year-over-year is up as much as 715% according to a study by Cyber Florida at the University of South Florida. If it isn’t already, cybersecurity should be on your board agenda at every meeting. As a starting point, the board needs to understand the layers of defense available to mitigate ransomware risk and design their responses to the threats accordingly.
In this podcast, two industry experts discuss how boards’ oversight of data governance within their organizations is changing to meet the opportunities and risk in the rapidly evolving digital space in which organizations are conducting their business. The key takeaways:
Protect your organization against cybersecurity. Be cyber smart and learn more about combatting ransomware in the time of COVID-19, how cybersecurity continues to be a top issue for retirement plans, and how to assess the gaps in your cyber coverage and reduce your exposure.
Recognize that a cyber attack will occur at some point during a business lifecycle. Whether it is through web attacks, email phishing, exploit kits, point of sale, keystroke logging, or ransomware, the bad actors have figured out how to defeat your latest defense against a cyber attack. They know what will make you click on the link that will give them the beachhead into your computer system.
Investment in collectible assets is growing worldwide as wealthy individuals in emerging markets such as China, India, and Latin America join the ranks of collectors. While most collectors invest primarily for their own pleasure, collectibles can be a good investment, too. If you collect items that you’re passionate about—whether they are cars or wine or jewelry or even autographed baseballs—it’s important to consider the financial side of your avocation and how to maximize the investment value of your collection.
It is an unfortunate fact of life that, as we age, our cognitive powers often decline. To assist people as they reach this stage in their lives, states provide a mechanism by which a person’s friends and family may petition a court to declare him or her incapacitated, and for the court to appoint a guardian to manage his or her affairs. While the guardianship process is meant to assist people in cognitive decline, it also exposes them to considerable risk. However, there are steps that you and your family can take to minimize those risks, including designating a preneed guardian.
Cloud-based applications, also known as Software as a Service (SaaS), offer significant benefits. They are highly affordable, require minimal IT involvement, have no hardware requirements, and offer great flexibility. Yet there can be significant risks to a firm if it does not review vendors carefully. Unfortunately, security controls vary significantly from one SaaS provider to the next. Knowing what to look for when selecting SaaS vendors and implementing sound security measures will help protect your firm against a data breach and the significant repercussions that come with it.