Tag: cyberattack

DOJ’s New Enforcement Team May Intensify Push to Recover Cyberattack Payments

The U.S. Department of Justice (DOJ) recently announced the launch of a National Cryptocurrency Enforcement Team (NCET) to (1) add structure to and coordinate the agency’s investigative capabilities concerning unlawful uses of cryptocurrency, (2) increase prosecutions, and (3) recover illicit proceeds. The last piece is especially striking because it may provide a positive incentive for […]

Tips for Training Employees Against Cyberattacks

The COVID-19 outbreak has affected almost every area of our pre-pandemic “normal” lives including more telework, a surging demand for toilet paper, and a shrinking workforce, just to name a few. Almost no industry has been spared when it comes to the contagious disease’s impact. In particular, cyberattacks are on the rise in nearly every […]

Cybersecurity

Best Practices for Data Breach Detection, Response

It’s not a matter of who will be affected by a data breach but when. The COVID-19 pandemic has awakened a Pandora’s box of data predators. For a company, the breaches can be costly, both financially and in other ways, including the devastating toll they can take on your reputation. Many breaches occur because of […]

Why Employers Should Include Cybersecurity Needs for Remote Workers

Though remote work started as a disaster response, businesses and employees alike have since noted the benefits that can come from working at home, including improved worker satisfaction, increased productivity, reduced commute times, and lower overheads. However, it’s important to acknowledge that alongside all of its advantages, remote work also has some ongoing issues, not […]

cybersecurity

Cybercrime not just tech department’s problem; HR also has role to play

With headlines about data breaches, ransomware, viruses, and other cyberthreats becoming routine, it seems no one is immune, especially now with the rise of the “internet of things”—all those devices capable of accessing the internet and collecting and exchanging data. Today’s malicious hackers have no shortage of opportunities to wreak havoc.  Such a pervasive and […]