10 Steps to Survive a Data Breach (Part 2/2)

“An ounce of prevention is better than a pound of cure.” In line with this idiom, we discussed the prevention of a data breach in last week’s article. These measures are minimum prerequisites to reduce risk exposure and allow early detection. However, recent cyber-incidents have proven that breaches can happen to anyone and accordingly the following measures will help you deal with the situation effectively.

10 Steps to Survive a Data Breach (Part 1/2)

According to a study by Ponemon, a private security research institute, average costs of data breaches in Germany increased from 3.42 to 3.5 million Euros (data for 2013/2014). The costs are the result of post-data breach work such as investigation, remediation, legal counsel, help desk activity, customer churn and identity protection. Similar numbers for other central European countries apply.

Your Security Operations Center (SOC): Built, Shared or as-a-Service?

Cyber attacks have become ever more frequent, targeted and sophisticated. Millions of warnings are produced by platforms, applications and numerous point solutions like antivirus (AV), intrusion detection system (IDS)/ intrusion prevention system (IPS) and firewalls. Quality and speed of the response are essential to limit the impact on your organization. Unfortunately, the trend is going in the opposite direction. Due to the increased complexity of the attacks, companies are forced to employ more and more resources to detect and eliminate a threat. A professionally designed…

Cybersecurity: Big Opportunities for Big Data

What has Big Data been up to? Big Data has been a major topic in the IT realm for years. The terms Big Data and Big Data analytics are generally used to describe the potential for new insights into our environment by making sense of the rapidly increasing amount of information produced by the growing number of connected devices. But what is the bigger picture in the potential of Big Data in cybersecurity?

10 Things Board Members Should Know and Ask About Cybersecurity

Security is like most business decisions not a democratic decision. You as board member, CEO, COO or CFO define the level of security your company stands for. The challenge is that you speak a different language than your security professionals. They might seem overly paranoid or technical for you and do not understand the realities and priorities you have to deal with on a daily basis. Given the evolving information security threats to any organization, it’s imperative that you set the security standards of your…

Copyright 2015 21st CENTURY IT · RSS Feed · Anmelden