Hitachi Group Global Network




Middle East and Africa



Ransomware: What About the Law?
You are here: Home \ Blog
Above Security Interview
Posted on Friday, November 18th, 2016 by
Shopping online for Black Friday is convenient. You avoid the crowds, you can browse more effectively with the comfort of your home. However, we are not immune to security. How to protect yourself from identity theft or credit card fraud?

Topics: Security Practices, Tips & Tricks

Ransomware What About the Law
Posted on Tuesday, November 15th, 2016 by
What are the legal implications of ransomware? How should organizations prevent, respond and recover from digital extortion?

Topics: Cyber Law, Ransomware, Security Practices

Posted on Tuesday, November 15th, 2016 by
2016 has been a whirlwind year when it comes to ransomware attacks. Ransomware incidents have exploded and organizations, especially those holding critical information, find themselves helpless to combat the malicious code.

Topics: Ransomware, Security Practices

Building a Security Operations Center
Posted on Thursday, November 10th, 2016 by
We rely on connectivity for nearly all aspects of business which puts companies at risk to a multitude of hacks such as malware, phishing, ransomware, and denial-of-service attacks. It is more important than ever for organizations to escalate their level of protection against cyber-attacks. Fortifying your organization’s security posture has become one of the top priorities for businesses across all industries. Building a Security Operations Center or SOC in order to centralize defenses, coordinate and deploy people, processes and technology is a growing part of the strategy of information security leaders in even small and medium-sized businesses.

Topics: MSS, Security Operations Center, Security Practices

Risk Management - Why Perspective is Essential
Posted on Friday, October 28th, 2016 by
Everybody deals with risk management. Including you! Here is one of the lessons learnt from my personal life...

Topics: Tips & Tricks

Learning How Hackers Hack
Posted on Wednesday, October 19th, 2016 by
Organizations are moving beyond the “it will never happen to me” phase of cybersecurity reality to the “it’s only a matter of time” phase. The laundry list of leading edge technology companies and government organizations that have fallen victim to cyber-crime over the past several months has sent a clear and urgent message to those organizations that have remained unharmed… thus far. The time to get serious about protecting your sensitive documents, proprietary company information, and customer data is now.

Topics: Penetration Testing, Security Practices

Repercussions of a data breach
Posted on Friday, October 7th, 2016 by
What could go wrong with bad cybersecurity? On September 22, 2016, Yahoo! officially acknowledged the largest data breach in the history of the Internet. It evaluated that about 500 million Yahoo! user accounts were stolen. Business Insider reported that the number of affected accounts may be between 1 Billion and 3 Billion. The full breadth of the incident still has to be assessed, but the information that was copied included full names, phone numbers, birth dates, email addresses, and even security question-and-answers pairs which created by the user to authenticate the account.

Topics: Managed Security Services, Security Practices, Tips & Tricks

ashley madison
Posted on Tuesday, September 27th, 2016 by
Every now and then, a data breach is widely publicized by the media. Obviously, the Ashley Madison breach had all of the characteristics to attract such coverage. The case constitutes an opportunity to exemplify the legal obligations of businesses under PIPEDA, while illustrating the numerous issues that fast-growing and emerging companies are faced with when trying to keep up with their obligations. Here are five lessons drafted from the joint report which I believe to be valuable when evaluating how to protect your organization’s most valuable asset – data.

Topics: Control Assessment, Controls, Penetration Testing, Privacy & Security, Risk management, Threat Risk Assessments

Posted on Wednesday, September 14th, 2016 by
Can Industrial Control Systems and Internet Technologies work together? We’ve come a long way since the time when the merging of these two technologies was first discussed in earnest. While progress has been made, we still have a long way to go. Industrial Control Systems Security remains a critical issue...

Topics: ICS Security

How to Build a Successful Security Program- 4 Things You Should Consider
Posted on Thursday, September 1st, 2016 by
As security professionals, we are responsible for protecting our corporate data against cyber threats on a 24/7 basis. But what does it take to build a successful security program?There are several easy steps to take to build an effective information security program following the control-based approach. Here are 4 things you should consider to help create a successful security program.

Topics: CISO, Risk management, Security Practices, Tips & Tricks

Latest Webinars | Watch Now

Cybersecurity, Cyber Crime and Your Business — How to Strengthen Your Cybersecurity Posture – In collaboration with Cytelligence

Watch Now

Cybersecurity 101 for Credit Unions – In collaboration with the Caribbean Confederation of Credit Unions (CCCU)

Watch Now

Introduction to Technical Security Testing for Credit Unions – In collaboration with the Caribbean Confederation of Credit Unions (CCCU)

Watch Now