<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>CISA Archives - Zasio</title>
	<atom:link href="https://zasio.com/tag/cisa/feed/" rel="self" type="application/rss+xml" />
	<link>https://zasio.com/tag/cisa/</link>
	<description>Digital Records Management Software</description>
	<lastBuildDate>Wed, 18 Oct 2023 21:16:03 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://zasio.com/wp-content/uploads/2023/05/cropped-zasiopurplefavicon-32x32.png</url>
	<title>CISA Archives - Zasio</title>
	<link>https://zasio.com/tag/cisa/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>‘Tis the Season… for a Data Breach</title>
		<link>https://zasio.com/tis-the-season-for-a-data-breach/</link>
					<comments>https://zasio.com/tis-the-season-for-a-data-breach/#respond</comments>
		
		<dc:creator><![CDATA[Zasio]]></dc:creator>
		<pubDate>Thu, 02 Dec 2021 20:04:39 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[By Heather Rice]]></category>
		<category><![CDATA[CISA]]></category>
		<category><![CDATA[cyber attacks]]></category>
		<category><![CDATA[Cyber security]]></category>
		<category><![CDATA[cyber-theft]]></category>
		<category><![CDATA[Cybersecurity and Infrastructure Security Agency]]></category>
		<category><![CDATA[data breach risks]]></category>
		<category><![CDATA[Heather Rice]]></category>
		<category><![CDATA[information governance]]></category>
		<category><![CDATA[Information Governance consulting software]]></category>
		<category><![CDATA[Information Governance software]]></category>
		<category><![CDATA[phishing scams]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[records and information management]]></category>
		<category><![CDATA[spear-phishing]]></category>
		<category><![CDATA[whaling]]></category>
		<guid isPermaLink="false">https://wordpress-140425-3498808.cloudwaysapps.com/?p=479</guid>

					<description><![CDATA[<p>The post <a href="https://zasio.com/tis-the-season-for-a-data-breach/" data-wpel-link="internal">‘Tis the Season… for a Data Breach</a> appeared first on <a href="https://zasio.com" data-wpel-link="internal">Zasio</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="et_pb_section et_pb_section_0 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_0">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_0  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_0  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner">The leaves are changing color and falling to the ground, pumpkin spice is on nearly every store shelf, and the air is chilly—Yes, the holidays will soon be upon us. Before you start your holiday shopping or bring out the decorations, it’s important to remember that the holidays are prime time for data breaches and cyber theft.</p>
<p>The Cybersecurity and Infrastructure Security Agency (CISA) defines a data breach as the “unauthorized movement or disclosure of sensitive information to a party, usually outside the organization, that is not authorized to have or see the information.”<a href="https://www.zasio.com/tis-the-season-for-a-data-breach/#_ftn1" name="_ftnref1" data-wpel-link="internal">[1]</a> Each year, many large companies experience a data breach. You may not think this could happen to you, but the truth is that every company is vulnerable to hacking. According to Risk Based Security, a cyber vulnerability intelligence, data breach, and risk ratings company, the first two quarters of 2021 had 1,767 breaches. These breaches led to approximately 18.8 billion exposed records between January and June.<a href="https://www.zasio.com/tis-the-season-for-a-data-breach/#_ftn2" name="_ftnref2" data-wpel-link="internal">[2]</a> Data breaches can become very expensive. On top of ransom demands, you also have investigation, mitigation, and legal costs. But the biggest cost often is the loss of consumer confidence or closure of the business entirely.</p>
<p>So why do attacks often occur during the holidays? One reason is that companies often operate with a skeleton crew making it difficult to communicate with IT staff. This leads to longer response times in an attack, which allows damage to extend much further compared to an attack during normal working hours. These attacks can come in many forms so it’s important to know what they look like in the event you come across one.</p>
<p><strong>Types of Data Breaches</strong></p>
<p>Here are a few of the ways hackers may gain access to your information:</p>
<ol>
<li><strong>Phishing Scams</strong>. Phishing happens through emails or messaging applications that appear to be legitimate and attempt to exploit your trust. Examples of phishing include:</li>
</ol>
<ul>
<li>
<ul>
<li><strong>Email phishing</strong> is one of the more well-known cyber-attacks. Attackers impersonate brands and send emails that lead victims to click on links or download malicious content that installs malware on the victim’s device.</li>
<li><strong>Spear-phishing</strong> is a targeted attempt by a person disguised as a trusted individual, such as a friend, co-worker, or family member, to obtain sensitive information (think account credentials, money, or financial information). Attackers often target their victims by   looking at the victim’s personal information available on the internet, such as social media websites. The attacker requests the victim perform an unusual task hoping the victim has enough trust to perform the task without question.</li>
<li><strong>Whaling</strong> is similar to spear-phishing except it involves supposed “senior officials” at a company. In this type of phishing, scammers imitate a senior staff member after using the company’s website to obtain names and email addresses. These emails are sent to unsuspecting subordinate staff with a request, such as transferring money or reviewing a document that contains malicious content. If you don’t typically receive emails or messages from company higher ups, this should be a red flag.</li>
</ul>
</li>
</ul>
<p>2. <strong>Ransomware</strong>. Ransomware is malicious software that targets a company’s data by blocking access to their systems. According to Fortune.com, ransomware attacks grew by 150 percent in 2020. Given this increase, Fortune.com estimates damages from cybercrimes may reach $6 trillion in 2021. The FBI and CISA have noted that hackers are increasingly deploying ransomware during holidays when offices are often closed.<a href="https://www.zasio.com/tis-the-season-for-a-data-breach/#_ftn3" name="_ftnref3" data-wpel-link="internal">[3]</a> As the hackers’ thinking goes, holiday attacks maximize damage and companies caught off guard will have little choice but to meet their demands.</p>
<ul>
<li>
<ul>
<li><strong>Non-secure Wi-Fi Connections</strong>. Since many companies still have employees working remotely, connecting to secure Wi-Fi is especially important. You should warn your employees about using public Wi-Fi connections where cyber criminals can intercept communications or setup up Wi-Fi connections that appear legitimate, but are fake and used to steal information. Employees should be extra diligent during the holidays when accessing their email or company systems remotely.</li>
</ul>
</li>
</ul>
<p><strong>How to Protect Yourself</strong></p>
<p>The reality is that we are all at risk of data breaches and cybersecurity issues; however, there are some things you can do to protect yourself and your consumers. Here are a few key examples:</p>
<ol>
<li><strong>Education</strong>. Training your employees about the importance of cybersecurity is just as important as other IT maintenance and document management protocols. Set aside some time for employee refresher courses on the importance of not opening emails, attachments, or clicking on links from unknown sources, not sending sensitive documents through personal email accounts, using secure Wi-Fi connections, and keeping track of company devices.</li>
<li><strong>Investing in cybersecurity software</strong>. The return on investment could be exponential. Also, keep all software up-to-date. Software that is out-of-date may contain weaknesses in which hackers may take advantage of. Software updates and patches work to repair these vulnerabilities and protect your data.</li>
<li><strong>Implement a strict password policy</strong>. Strong passwords should be used by everyone, whether you’re an employee or a consumer. Do not reuse passwords or use passwords that contain information that can be public knowledge (for example, your birthday, a pet’s name, or a child’s name). Passwords should contain a variety of characters, numbers, and upper and lowercase letters.</li>
<li><strong>Use two-factor authentication</strong>, especially for remote access. Two-factor authentication provides another security layer that makes it more difficult for hackers to login and use your accounts because the hackers will need another piece of information other than your username and password. This often comes in the form of an SMS code sent to your phone or a code provided by an authenticator app.</li>
</ol>
<p><strong>Conclusion</strong></p>
<p>Holidays are great; we all want to enjoy them. After all, who doesn’t love shopping and decorating while sipping on a hot pumpkin spiced beverage. But a data breach may put an end to your holiday spirit. Educating yourself and your employees about ways to prevent against cyber-attacks is not only the best defense against such attacks, but also the best way to and ensure peace of mind during the holidays and beyond. <a href="https://www.zasio.com/about-us/contact-us/" data-wpel-link="internal">Contact Zasio</a> today to explore the software and consulting solutions we offer, to address your information governance needs.</p>
<p>&nbsp;</p>
<p><a href="https://www.zasio.com/tis-the-season-for-a-data-breach/#_ftnref1" name="_ftn1" data-wpel-link="internal">[1]</a> Cybersecurity and Infrastructure Security Agency, National Initiative for Cybersecurity Careers and Studies, Cybersecurity Glossary, available at: <a href="https://niccs.cisa.gov/about-niccs/cybersecurity-glossary" data-wpel-link="external" rel="external noopener noreferrer">https://niccs.cisa.gov/about-niccs/cybersecurity-glossary</a> (accessed October 21, 2021).</p>
<p><a href="https://www.zasio.com/tis-the-season-for-a-data-breach/#_ftnref2" name="_ftn2" data-wpel-link="internal">[2]</a> Risk Based Security. “2021 Mid Year Report.” 2021, https://pages.riskbasedsecurity.com/hubfs/Reports/2021/2021%20Mid%20Year%20Data%20Breach%20QuickView%20Report.pdf</p>
<p><a href="https://www.zasio.com/tis-the-season-for-a-data-breach/#_ftnref3" name="_ftn3" data-wpel-link="internal">[3]</a> Alsever, Jennifer. “Why company hacks tend to happen over holiday weekends.”6 July 2021, https://fortune.com/2021/07/06/why-company-hacks-tend-to-happen-over-holiday-weekends/</p>
<p><em>Disclaimer: The purpose of this post is to provide general education on Information Governance topics. The statements are informational only and do not constitute legal advice. If you have specific questions regarding the application of the law to your business activities, you should seek the advice of your legal counsel.</em></div>
			</div>
			</div>
				
				
				
				
			</div><div class="et_pb_row et_pb_row_1">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_1  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_with_border et_pb_module et_pb_team_member et_pb_team_member_0 clearfix  et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_team_member_image et-waypoint et_pb_animation_off"><img decoding="async" width="96" height="96" src="https://zasio.com/wp-content/uploads/2022/05/Heather-Rice-01-96x96-1.jpg" alt="Author: Heather Rice" class="wp-image-2088" /></div>
				<div class="et_pb_team_member_description">
					<h4 class="et_pb_module_header">Author: Heather Rice</h4>
					<p class="et_pb_member_position">Senior Research Analyst / Certified Paralegal</p>
					
					
				</div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div>
<p><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fzasio.com%2Ftis-the-season-for-a-data-breach%2F&amp;linkname=%E2%80%98Tis%20the%20Season%E2%80%A6%20for%20a%20Data%20Breach" title="Facebook" rel="nofollow noopener external noreferrer" target="_blank" data-wpel-link="external"></a><a class="a2a_button_x" href="https://www.addtoany.com/add_to/x?linkurl=https%3A%2F%2Fzasio.com%2Ftis-the-season-for-a-data-breach%2F&amp;linkname=%E2%80%98Tis%20the%20Season%E2%80%A6%20for%20a%20Data%20Breach" title="X" rel="nofollow noopener external noreferrer" target="_blank" data-wpel-link="external"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fzasio.com%2Ftis-the-season-for-a-data-breach%2F&amp;linkname=%E2%80%98Tis%20the%20Season%E2%80%A6%20for%20a%20Data%20Breach" title="LinkedIn" rel="nofollow noopener external noreferrer" target="_blank" data-wpel-link="external"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share#url=https%3A%2F%2Fzasio.com%2Ftis-the-season-for-a-data-breach%2F&#038;title=%E2%80%98Tis%20the%20Season%E2%80%A6%20for%20a%20Data%20Breach" data-a2a-url="https://zasio.com/tis-the-season-for-a-data-breach/" data-a2a-title="‘Tis the Season… for a Data Breach" data-wpel-link="external" rel="external noopener noreferrer"></a></p><p>The post <a href="https://zasio.com/tis-the-season-for-a-data-breach/" data-wpel-link="internal">‘Tis the Season… for a Data Breach</a> appeared first on <a href="https://zasio.com" data-wpel-link="internal">Zasio</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://zasio.com/tis-the-season-for-a-data-breach/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
