Internet Explorer Zero Day Vulnerability
Qihoo 360, a Chinese internet security company, discovered a zero-day vulnerability (CVE – 2018 – 8174) with the current version of Internet Explorer after foreign trade organizations in China were affected by the exploit. The “double kill”…Avalution Team | May 31, 2018
GDPR: The End of Gated Content?
As the GDPR comes into effect, many marketers are scrambling to align their online marketing strategies to the regulation. Unfortunately, like most regulations, there are many requirements that are confusing or ambiguous; one of those is the…Avalution Team | May 28, 2018
Addressing the Ransomware Threat at Hospitals and Health Systems
Working toward a cross-functional solution to protect against the ransomware threat. The key operational challenge with a ransomware attack at a hospital is that system downtime is basically a guarantee. Whether the ransomware itself cripples one or…Patrick Meidenbauer | May 03, 2018
Using DMARC Effectively
Implementing DMARC is one thing. Making the commitment to implement DMARC in its most aggressive configuration is another. Conceptually, Domain-based Message Authentication, Reporting, and Conformance (DMARC) is simple. DMARC provides a mechanism for email receivers to validate…Avalution Team | Feb 28, 2018
Are You Ready for the General Data Protection Regulation (GDPR)?
As we move closer to the enforceable compliance date of May 25, 2018 for the General Data Protection Regulation (GDPR), many organizations are asking themselves if they are on track to meet the regulation requirements. Many organizations…Avalution Team | Jan 30, 2018
Formalizing an Information Security Program
Formalizing your information security program is a critical step to drive information security capability maturation in any organization. The intent of formalizing a program is to get clear on focus and ensure everyone is on the same…Rob Giffin | Nov 27, 2017
Ransomware Changes the Game for IT Disaster Recovery
Imagine entering your workplace and being met with a sign instructing you NOT to turn on your desktop computers or dock your laptops until further notice. No network access; no email; no dependent application. Unfortunately, this was…Rob Giffin | Oct 25, 2017
Ownership – Where Do Our Responsibilities Begin and End as Business Continuity Professionals?
As published in the Summer 2016 Issue of the Disaster Recovery Journal – Volume 29, Number 3. One of the latest threats to organizations is something termed “ransomware”. Commonly defined as a type of malware that blocks…Brian Zawada, FBCI | Aug 15, 2016
Integrating Cyber Security and Business Continuity
The last several years have continued to see an increase in the sophistication and volume of cyber threats, with a 42% increase in targeted attacks in 2012 (as reported by Symantec, in its 2013 Internet Security Threat…Avalution Team | Dec 05, 2013
Data Breaches On Deck for Federal Oversight (Again)
In December 2009, my perspective titled “Data Breaches: A Sidewalk Sale of Consumer and Personal Information” detailed the financial, reputational and regulatory implications surrounding a data breach occurrence. Since then, little has changed (other than the fact…Avalution Team | Jun 27, 2011