Hitachi

U.S.A.

Hitachi Group Global Network

Americas

Asia

Europe

Middle East and Africa

Oceania

Close

GDPR Compliance and Data Privacy
You are here: Home \ Blog
Protect Your Small Business from Cyber Attacks
Posted on Tuesday, October 24th, 2017 by
Small businesses are prime targets for cyber attacks. Follow these 5 ways to protect your small business from cyber attacks.

Topics: Security Practices

GDPR Compliance
Posted on Tuesday, October 10th, 2017 by
What you need to know about GDPR significant requirements for businesses to implement comprehensive privacy programs including mandatory privacy by design and data protection impact assessments.

Topics: Compliance, Privacy & Security

equifax data breach
Posted on Wednesday, October 4th, 2017 by
Equifax slow response causes public outcry. What is the impact of the Equifax hack? What practices to follow in order to avoid catastrophic loss?

Topics: Control Assessment, Incident Response, Managed Security Services, Penetration Testing, Security Practices, Threat Risk Assessments, Vulnerability Assessment

2017 Ransomware Trends and How to Protect Yourself Against the Malware

Topics: Ransomware

NIST compliance
Posted on Monday, September 25th, 2017 by
By December 31, 2017, federal contractors or organizations that serve the federal government will need to meet the 110 individual controls in NIST 800-171 pertaining to the handling of CUI in order to maintain compliance with the Federal Government.

Topics: Compliance, Control Assessment

Dragonfly 2.0 Targets Energy Sector
Posted on Thursday, September 14th, 2017 by
DragonFly Group attacks energy companies in the US in hacking campaign against power and utilities sector. Attackers access to SCADA networks in an APT attack.

Topics: ICS Security

Posted on Tuesday, September 12th, 2017 by
Penetration Tests offer a real time analysis of an organizations security posture by identifying vulnerabilities and a plan to eliminate them in order of criticality

Topics: Penetration Testing, Security Practices

Control assessments - where to start
Posted on Tuesday, September 5th, 2017 by
Security Control Assessments have become critical tools for organizations due to the growing number of destructive cyberattacks across the world. Increasingly, organizations need to strengthen their defenses against data breaches, cybercrime and fraud to ensure even the most basic security posture. Frameworks such as NIST, CIS/SANS 20 or ISO 27001 have separated themselves as the best practice frameworks for organizations to assess their current IT security maturity and set goals to improve the procedures that they use to protect sensitive data, perform change management, and provide access to critical assets. We’ve gathered today’s most common security control frameworks to simplify the complex world of compliance and and security control assessments.

Topics: CISO, Compliance, Control Assessment, Controls, Managed Security Services, PCI DSS, Penetration Testing, Security Practices

Penetration Testing is a Critical Component of PCI Compliance
Posted on Tuesday, August 29th, 2017 by
For any business that handles credit card data, penetration testing has been a requirement since 2013. See how a pentest can help your organization become PCI compliant.

Topics: Compliance, PCI DSS, Penetration Testing

Incident Response
Posted on Tuesday, August 22nd, 2017 by
Over 80% of small and midsized organizations reported suffering at least one cyberattack in the last 12 months, with an average cost of nearly $1 million to restore servers, databases, other systems and data to return to normal business operation after a successful attack. The results of these attacks are staggering: 60% of small companies that suffer a cyberattack are out of business within six months of the attack as suggested by the National Cyber Security Alliance. With such high costs associated with significant attacks, organizations must be prepared to detect and respond to attackers if they are to limit damage and subsequently reduce costs to maintain their business.

Topics: Incident Response, Security Practices

... 91011121314151617 ... 18 ...

Latest Webinars | Watch Now

Cybersecurity, Cyber Crime and Your Business — How to Strengthen Your Cybersecurity Posture – In collaboration with Cytelligence

Watch Now

Cybersecurity 101 for Credit Unions – In collaboration with the Caribbean Confederation of Credit Unions (CCCU)

Watch Now

Introduction to Technical Security Testing for Credit Unions – In collaboration with the Caribbean Confederation of Credit Unions (CCCU)

Watch Now