Companies over the past several years have been shoring up their cybersecurity capabilities and increasing overall security budgets, but Software as a Service (SaaS) providers are often overlooked in these efforts.
Insight Category: Cybersecurity
Read this article from Reader’s Digest that outlines the ‘8 Places You Should Never Use Free Wi-Fi’ where Liberty Advisor Group’s Armond Caglar is quoted with his perspective.
Recently healthcare data breaches have grown in both size and frequency, with the most significant breaches impacting as many as 80 million people. Medical data can paint an intimate picture of a person’s life, which makes the information particularly valuable to cyber actors looking to exploit victims. As the healthcare industry continues to adopt new technologies, the volume of sensitive data that can be extracted through existing security gaps grows exponentially.
Cybersecurity risk oversight is a major focus for boards and one that will remain front and center on their agendas. In recent years, boards have often underestimated cybersecurity risks, resulting in large breaches with significant costs despite significant investments in defensive technologies.
An athletic clothing design company was looking to strategically select a mix of technologies to power their e-commerce sites while ensuring that protection against cybersecurity threats was top priority. Cybeta’s tools were used for a technology attack chain analysis, yielding an objective and predictive measure of how each layer of the e-commerce platform would perform as a stack. The right mix of technologies optimized breach likelihood, return on investment, and potential breach damages.
There are numerous applications for blockchain in cyberspace – all of them capitalizing on the fundamental security provided by decentralization and data immutability.
A wily type of malware that has been around for 30 years, ransomware seems like it would have been obsolete by now. But the rise of cryptocurrency has helped ransomware gain ground as identifying the receiver of payments becomes harder.
To build cybersecurity, attention must be focused on persistent, predictive, real-time analysis of the entirety of discoverable technologies. Data should be compiled from dozens of sources, and partnerships forged with specialized groups, including local, state and federal agencies.
Vulnerability to cyber threats is starting to be a key element in due diligence process – as Yahoo found when two massive cyber breaches led Verizon to reduce its purchase price for the Internet company by $350 million.
The travel industry has been an attractive investment area for Private Equity, showing around 5% growth every year. PE firms should take an extra look at any of their portfolio companies in the travel, hospitality, loyalty space and take the necessary steps to ensure customer data is protected. Applying a strategic approach to security will empower companies to identify and prioritize their sensitive assets so they can proactively safeguard them.