Hitachi

U.S.A.

Hitachi Group Global Network

Americas

Asia

Europe

Middle East and Africa

Oceania

Close

Category: Security Practices
You are here: Home \ Security Practices
Ransomware Infection
Posted on Wednesday, November 27th, 2019 by
You’ve been infected with ransomware… now what? And what are some effective tips to prevent ransomware infection? Ransomware is a type of malware that continues to cause havoc across the world. In this blog article, we are sharing 5 effective tips to help your business prevent ransomware infections.

Topics: Phishing, Ransomware, Security Practices, Social Engineering, Tips & Tricks, Trends & Technologies

Black Friday Shopping
Posted on Wednesday, November 20th, 2019 by
Many of us eagerly await the annual Black Friday offers to get a good deal on holiday presents (or gifts to self!). Unfortunately, Black Friday is also a great opportunity for cybercriminals looking to scam customers out of hard-earned money and valuable personal data.  As we prepare for Black Friday shopping, what should online shoppers watch out for and how can they protect themselves against scams?

Topics: Phishing, Security Practices, Social Engineering, Tips & Tricks, Uncategorized

Credit Unions Cybersecurity Posture
Posted on Thursday, October 31st, 2019 by
How can credit union professionals strengthen their cybersecurity posture? Much like banks, credit unions hold large amounts of highly sensitive data about members, including financial and personal information such as credit scores, banking information and investment history. In this blog article, we'll talk about why cybersecurity is important for credit unions, how credit unions can evaluate and improve their cybersecurity posture, and which first steps credit unions should undertake to strengthen their security defenses.

Topics: Compliance, Control Assessment, Cybersecurity Posture, Security Practices, Tips & Tricks, Uncategorized

Data Privacy_NIST Privacy Framework
Posted on Wednesday, October 9th, 2019 by
What is the NIST Privacy Framework and how does it relate to data privacy? Currently in draft stage, the framework was designed to help organizations determine the risk levels of data privacy within their systems. In this article, we take a look at the new NIST Privacy Framework and how it can help your business meet data privacy requirements.

Topics: Compliance, Cyber Law, Privacy & Security, Resource, Security Practices, Trends & Technologies

Posted on Tuesday, September 17th, 2019 by
What exactly is social engineering and how does it work? In this blog article, we talk about this very popular (ethical) hacking practice, describe how and why it works and provide a breakdown of a socially engineered scam.

Topics: Artificial Intelligence, Cybersecurity Posture, Penetration Testing, Phishing, Security Practices

Posted on Thursday, September 12th, 2019 by
With digital transformation becoming the watchword of the first half of the 21st century, what is the outlook on this trending topic now and in the future? In this article, we look at how digital transformation has revolutionized businesses with the latest trends and technologies, including blockchain, DevOps, cloud computing, data privacy and artificial intelligence, just to name a few.

Topics: Artificial Intelligence, BIg Data, CISO, Cloud Security, Digital Transformation, Machine Learning, Managed Security Services, Security Practices, Trends & Technologies

Capital One Data Breach
Posted on Tuesday, September 3rd, 2019 by
What are the some of the lessons learned from the recent and unarguably massive Capital One data breach? In this blog article, we take a look at what happened and what we can do to prevent our own organization from suffering a data breach.

Topics: Managed Security Services, Penetration Testing, Security Practices, Tips & Tricks

Posted on Tuesday, August 20th, 2019 by
All too soon, the summer holidays will come to an end. For some of us, this means getting back to work, starting a new job, or sending our children off to school or university. We don’t think twice about teaching our children about road safety, but now we have to add cybersecurity to the things we teach our children about. In this blog article, we've gathered some cybersecurity tips to help keep parents and their children cybersecure and in today's increasingly digital world.

Topics: Phishing, Security Practices, Tips & Tricks

Posted on Tuesday, July 2nd, 2019 by
Industries and cities across the globe are turning to smart technologies to solve complex problems. In doing so, they generate and analyze subject data to feed intelligent applications. This brings enormous responsibility in ensuring the ethical use of these data. In applying a privacy-enhanced and ethical approach when building technological solutions, we must start by embracing the idea of Ethical by Design. Learn more about data privacy and ethics in our latest blog post.

Topics: Artificial Intelligence, Compliance, Cyber Law, Managed Security Services, Privacy & Security, Security Practices

Posted on Tuesday, June 18th, 2019 by
If you owned gold bars, would you keep them safe? Of course you would. Gold is valuable but so is personal data. It may not seem on the surface to have the same value as gold, but to our customers, it can represent their very identity. We must now ask ourselves: what does Canadian data privacy legislation do to help us protect our data? Data privacy has become incredibly important for businesses.

Topics: Compliance, Cyber Law, Managed Security Services, Privacy & Security, Security Practices

Latest Webinars | Watch Now

Cybersecurity, Cyber Crime and Your Business — How to Strengthen Your Cybersecurity Posture – In collaboration with Cytelligence

Watch Now

Cybersecurity 101 for Credit Unions – In collaboration with the Caribbean Confederation of Credit Unions (CCCU)

Watch Now

Introduction to Technical Security Testing for Credit Unions – In collaboration with the Caribbean Confederation of Credit Unions (CCCU)

Watch Now