Hitachi

U.S.A.

Hitachi Group Global Network

Americas

Asia

Europe

Middle East and Africa

Oceania

Close

Tag: cybersecurity
You are here: Home \ cybersecurity
Posted on Tuesday, March 24th, 2020 by
What guidelines should your organization be concerned with regarding information security when working from home? The world has entered “uncharted territory”. This was a statement from the World Health Organization (WHO) about the current COVID-19 pandemic. In reaction to this, companies across the world have fallen in line with health guidance on social distancing and...

Topics: Coronavirus, COVID-19, Data Protection Impact Assessment, DPIA, Pandemic Response Planning, Penetration Testing, Phishing, PIA, Ransomware, Remote working, Risk management, Social Engineering, wfh, Working from home

Posted on Friday, March 13th, 2020 by
Response plans provide to organizations the appropriate mechanisms for minimizing risk, loss and damage resulting from incidents such as COVID-19. As you are now aware, COVID-19, aka the Coronavirus, has spread across almost every continent on Earth. The virus has caused massive upheaval and societal changes in an attempt to contain the virus spread: Italy...

Topics: Business Continuity Plan, Business Impact Assessment, Coronavirus, COVID-19, Cybercrime, Pandemic Response Planning, Response Planning, Uncategorized

Posted on Friday, February 21st, 2020 by
Data privacy is critical for your organization as consumer pressure and regulatory fines is helping turn the tide on privacy attitudes by many enterprises including the tech giants. In our previous article on data privacy for businesses, we discussed what is meant by a Privacy Impact Assessment (PIA) and a Data Protection Impact Assessment (DPIA)....

Topics: Canada Privacy Act, Compliance, DPIA, GDPR, PIA, PIPEDA, Privacy & Security, Privacy Impact Assessment, Risk management, Uncategorized

Posted on Thursday, January 30th, 2020 by
Data privacy has evolved from “nice to have” to a business imperative and critical issue. More and more people are asking questions us about how their personal data is used.  Privacy is fast becoming an important issue for your brand. Even if you do not have a customer-facing business, the privacy of employees and others,...

Topics: Canada Privacy Act, Cyber Law, Data Protection Impact Assessment, DPIA, GDPR, PIA, PIPEDA, Privacy & Security, Privacy Impact Assessment, Uncategorized

Posted on Friday, January 17th, 2020 by
A Cybersecurity Posture Assessment gives your company the intelligence to know where you stand with respect to cybersecurity risk. The modern business faces cybersecurity challenges as never before. These challenges are being complicated by sophisticated techniques such as social engineering. Cyber-threats are compounded and facilitated through the hyper-connectivity offered by cloud computing, mobile devices, and...

Topics: Cybercrime, Cybersecurity Posture, Social Engineering, Uncategorized

Posted on Friday, January 10th, 2020 by
As cyber-attacks targeting cloud infrastructures increase, using a Cloud Security Posture Assessment can help you determine how best to reduce your organization’s risk. Indeed, cloud computing has become firmly established by organizations of all sizes and across all sectors. A cloud-based infrastructure facilitates digital transformation, offering opportunities to use best-of-breed cloud apps to help improve...

Topics: Cloud Security, Cybercrime, Cybersecurity Posture, Digital Transformation

People_Cybercrime_2019
Posted on Friday, December 20th, 2019 by
The state of people and cybercrime is reaching new heights. What do we mean by this? Cybercriminals are mastering the art and science of behavior manipulation. Phishing and other methods of social engineering are so prevalent that Proofpoint announced that 99% of all cyber-attacks need human intervention to proceed. In order to counter this, security awareness...

Topics: Cybercrime, Cybersecurity Posture, Deepfake, Penetration Testing, Ransomware, Social Engineering, Supply Chain

Posted on Thursday, December 12th, 2019 by
As cloud computing embeds itself in our corporate culture, how has security impacted its use in 2019? In this blog article, we looked at how the state of cloud security enabled business in 2019 and also found areas of concern around security.

Topics: Cloud Security, Cybersecurity Posture, Darknet Intelligence, DDoS, Vulnerability Assessment

Ransomware Infection
Posted on Wednesday, November 27th, 2019 by
You’ve been infected with ransomware… now what? And what are some effective tips to prevent ransomware infection? Ransomware is a type of malware that continues to cause havoc across the world. In this blog article, we are sharing 5 effective tips to help your business prevent ransomware infections.

Topics: Phishing, Ransomware, Security Practices, Social Engineering, Tips & Tricks, Trends & Technologies

nymity_privacy_webinar
Posted on Tuesday, February 5th, 2019 by
If you look at the title of this blog article and aren’t sure what to answer, you’re not alone. Even industry veterans find it hard to disentangle cybersecurity and data privacy. There is a good reason for this. They are associated, even intrinsically linked, and they both have to deal with nefarious elements that would do...

Topics: Cloud Security, Compliance, Cybersecurity Posture, Digital Transformation, ICS Security, Internet of Things, Managed Security Services, Office 365 Security, Penetration Testing, Phishing, Privacy & Security, Security Practices, Vulnerability Assessment

Latest Webinars | Watch Now

Cybersecurity, Cyber Crime and Your Business — How to Strengthen Your Cybersecurity Posture – In collaboration with Cytelligence

Watch Now

Cybersecurity 101 for Credit Unions – In collaboration with the Caribbean Confederation of Credit Unions (CCCU)

Watch Now

Introduction to Technical Security Testing for Credit Unions – In collaboration with the Caribbean Confederation of Credit Unions (CCCU)

Watch Now