4 Cybersecurity Awareness Month Initiatives for Your Company

Since 2004, October has been recognized as Cybersecurity Awareness Month by organizations like the Cybersecurity and Infrastructure Security Agency (CISA) and the National Cybersecurity Alliance (NCA), which are dedicated to helping individuals better protect themselves against online threats. This year CISA and NCA are focusing on the human element of security, with the 2022 Cybersecurity…

Read More

Increase Security Awareness to Prevent Ransomware Attacks

Despite automation, machine learning, and all the rest of the state-of-the-art detection technology at our fingertips, attackers still slip through the cracks. You can utilize tools such as website application firewalls and endpoint discovery and response solutions, but one of the most important ways to reduce your risk of being the victim of a ransomware…

Read More

Potential Cyber Ramifications of the Russia-Ukraine Crisis

As the Russia/Ukraine crisis develops, RH-ISAC is working to provide guidance to the retail and hospitality community concerned with the situation’s impact on their operations. Historically, Russian cyber activities during regional conflict start with massive DDoS attacks against the target states’ communications and civil infrastructure organizations. Other opportunistic attacks such as ransomware and data breaches…

Read More

Living Security Presents CyberEscape Online at RH-ISAC Security Awareness Symposium

RH-ISAC held its first-ever Security Awareness Symposium in October. The event was designed to help professionals in the retail and hospitality industries hone their security skills and gain clarity on the biggest cybersecurity issues their companies face. The morning began with remarks from Suzie Squier, RH-ISAC president, and Ed Adams, president and CEO of Security…

Read More

DMARC & BIMI: The Ultimate Multi-tool Against Phishing and Ransomware

Email phishing is the most dominant attack vector for cybercrime and ransomware worldwide. Hackers aren’t sneaking in through some backdoor, instead, they’re strolling in through the front thanks to insecure or misconfigured email systems and a lack of sufficient protocols. But what are the measures businesses need to be putting in place to stop this,…

Read More