<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>cyber criminals Archives - Zasio</title>
	<atom:link href="https://zasio.com/tag/cyber-criminals/feed/" rel="self" type="application/rss+xml" />
	<link>https://zasio.com/tag/cyber-criminals/</link>
	<description>Digital Records Management Software</description>
	<lastBuildDate>Sun, 17 Sep 2023 07:17:36 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://zasio.com/wp-content/uploads/2023/05/cropped-zasiopurplefavicon-32x32.png</url>
	<title>cyber criminals Archives - Zasio</title>
	<link>https://zasio.com/tag/cyber-criminals/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>While Your Employees were Sheltering, Cyber Criminals were Attacking</title>
		<link>https://zasio.com/while-your-employees-were-sheltering-cyber-criminals-were-attacking/</link>
					<comments>https://zasio.com/while-your-employees-were-sheltering-cyber-criminals-were-attacking/#respond</comments>
		
		<dc:creator><![CDATA[Zasio]]></dc:creator>
		<pubDate>Thu, 10 Sep 2020 18:11:01 +0000</pubDate>
				<category><![CDATA[Webinars]]></category>
		<category><![CDATA[cyber criminals]]></category>
		<category><![CDATA[data discovery]]></category>
		<category><![CDATA[file analysis]]></category>
		<category><![CDATA[information governance]]></category>
		<category><![CDATA[records management]]></category>
		<guid isPermaLink="false">https://wordpress-140425-3498808.cloudwaysapps.com/?p=615</guid>

					<description><![CDATA[<p>While the majority of companies sent their employees home to shelter-in-place and work remotely during the early stages of COVID-19, cybercriminals took advantage of the increased online activity and poor security on home networks. The FBI Internet Crime Complaint Center (IC3) has received 3 to 4 times the number of cyber-attack complaints due to the COVID-19 pandemic. Tonya Ugoretz, the deputy assistant director of the FBI’s Cyber Division, said that the “rapid shift to telework” has opened a huge amount of cyber vulnerabilities for hackers to exploit. Many companies came to find out that their data was vulnerable. Whether it’s a global pandemic or operating under the normal course of business, your company is at risk if you aren’t properly managing your information. How can you manage what you aren’t aware of, and how can you know what’s truly vulnerable if you haven’t classified it? In this webinar, Sherpa Software, a leading provider of Data Discovery and File Analysis solutions, and Zasio, a leading provider of Records Management and Information Governance solutions, come together to discuss best practices in Information Governance to ensure your company’s data is properly managed. We share guidance on the best approaches to assessing, analyzing, classifying, [&#8230;]</p>
<p>The post <a href="https://zasio.com/while-your-employees-were-sheltering-cyber-criminals-were-attacking/" data-wpel-link="internal">While Your Employees were Sheltering, Cyber Criminals were Attacking</a> appeared first on <a href="https://zasio.com" data-wpel-link="internal">Zasio</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>While the majority of companies sent their employees home to shelter-in-place and work remotely during the early stages of COVID-19, cybercriminals took advantage of the increased online activity and poor security on home networks.</p>
<p>The FBI Internet Crime Complaint Center (IC3) has received 3 to 4 times the number of cyber-attack complaints due to the COVID-19 pandemic. Tonya Ugoretz, the deputy assistant director of the FBI’s Cyber Division, said that the “rapid shift to telework” has opened a huge amount of cyber vulnerabilities for hackers to exploit. Many companies came to find out that their data was vulnerable. Whether it’s a global pandemic or operating under the normal course of business, your company is at risk if you aren’t properly managing your information. How can you manage what you aren’t aware of, and how can you know what’s truly vulnerable if you haven’t classified it?</p>
<p>In this webinar, Sherpa Software, a leading provider of Data Discovery and File Analysis solutions, and Zasio, a leading provider of Records Management and Information Governance solutions, come together to discuss best practices in Information Governance to ensure your company’s data is properly managed. We share guidance on the best approaches to assessing, analyzing, classifying, retaining, and legally destroying sensitive data according to your retention policies. It’s important to manage your information early, before hackers do it for you!</p>
<p>To learn more about our products and services visit:</p>
<ul>
<li><a href="http://www.sherpasoftware.com/" data-wpel-link="external" rel="external noopener noreferrer">www.sherpasoftware.com</a></li>
<li><a href="https://www.zasio.com/" data-wpel-link="internal">www.zasio.com</a></li>
</ul>
<p><iframe title="While Your Employees Were Sheltering Cyber Criminals Were Attacking" width="1080" height="608" src="https://www.youtube.com/embed/hnMSIMtzFl8?feature=oembed"  allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" allowfullscreen></iframe></p>
<p><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fzasio.com%2Fwhile-your-employees-were-sheltering-cyber-criminals-were-attacking%2F&amp;linkname=While%20Your%20Employees%20were%20Sheltering%2C%20Cyber%20Criminals%20were%20Attacking" title="Facebook" rel="nofollow noopener external noreferrer" target="_blank" data-wpel-link="external"></a><a class="a2a_button_x" href="https://www.addtoany.com/add_to/x?linkurl=https%3A%2F%2Fzasio.com%2Fwhile-your-employees-were-sheltering-cyber-criminals-were-attacking%2F&amp;linkname=While%20Your%20Employees%20were%20Sheltering%2C%20Cyber%20Criminals%20were%20Attacking" title="X" rel="nofollow noopener external noreferrer" target="_blank" data-wpel-link="external"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fzasio.com%2Fwhile-your-employees-were-sheltering-cyber-criminals-were-attacking%2F&amp;linkname=While%20Your%20Employees%20were%20Sheltering%2C%20Cyber%20Criminals%20were%20Attacking" title="LinkedIn" rel="nofollow noopener external noreferrer" target="_blank" data-wpel-link="external"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share#url=https%3A%2F%2Fzasio.com%2Fwhile-your-employees-were-sheltering-cyber-criminals-were-attacking%2F&#038;title=While%20Your%20Employees%20were%20Sheltering%2C%20Cyber%20Criminals%20were%20Attacking" data-a2a-url="https://zasio.com/while-your-employees-were-sheltering-cyber-criminals-were-attacking/" data-a2a-title="While Your Employees were Sheltering, Cyber Criminals were Attacking" data-wpel-link="external" rel="external noopener noreferrer"></a></p><p>The post <a href="https://zasio.com/while-your-employees-were-sheltering-cyber-criminals-were-attacking/" data-wpel-link="internal">While Your Employees were Sheltering, Cyber Criminals were Attacking</a> appeared first on <a href="https://zasio.com" data-wpel-link="internal">Zasio</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://zasio.com/while-your-employees-were-sheltering-cyber-criminals-were-attacking/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>The Age of the Cyber Breach and the Value of Information Governance (IG)</title>
		<link>https://zasio.com/age-of-cyber-breach-and-the-value-of-information-governance/</link>
					<comments>https://zasio.com/age-of-cyber-breach-and-the-value-of-information-governance/#respond</comments>
		
		<dc:creator><![CDATA[Zasio]]></dc:creator>
		<pubDate>Fri, 19 Jul 2019 20:24:35 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[cyber attacks]]></category>
		<category><![CDATA[cyber breach]]></category>
		<category><![CDATA[cyber criminals]]></category>
		<category><![CDATA[Cyber security]]></category>
		<category><![CDATA[GDPR]]></category>
		<category><![CDATA[information governance]]></category>
		<category><![CDATA[phishing emails]]></category>
		<guid isPermaLink="false">https://wordpress-140425-3498808.cloudwaysapps.com/?p=777</guid>

					<description><![CDATA[<p>Companies today are maximizing the value and usability of information like never before. Unfortunately, so are cybercriminals. During the first half of 2018, more than 3.3 billion records were compromised, with malicious outsiders being a major cause.[1] In the fight against cyber breaches, companies are at a steep disadvantage for many reasons. First, the internet was not designed with security in mind. It grew out of an experiment to send messages between researchers’ computers over a network. And its users grew so fast that the network, established on a foundation of collaboration and trust, remained a platform where its users are largely on their own to defend against cyber-attacks. Second, cybercrime is a low cost, high reward endeavor. Cybercriminals can operate from anywhere, and with impunity in many countries that tolerate and even encourage attacks against the West. Cybercrime is a profitable enterprise with a thriving marketplace for selling exploits (vulnerabilities that allow cyber criminals’ access to connected systems) as well as stolen personal information and trade secrets. To top it all off, well-funded, government-sponsored actors have been blamed for several high profile hacks. Third, cybersecurity is expensive, constantly evolving, and complex, especially for established companies relying on antiquated technology. [&#8230;]</p>
<p>The post <a href="https://zasio.com/age-of-cyber-breach-and-the-value-of-information-governance/" data-wpel-link="internal">The Age of the Cyber Breach and the Value of Information Governance (IG)</a> appeared first on <a href="https://zasio.com" data-wpel-link="internal">Zasio</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Companies today are maximizing the value and usability of information like never before. Unfortunately, so are cybercriminals. During the first half of 2018, more than 3.3 billion records were compromised, with malicious outsiders being a major cause.<a href="https://www.zasio.com/age-of-cyber-breach-and-the-value-of-information-governance/#_ftn1" name="_ftnref1" data-wpel-link="internal">[1]</a></p>
<p>In the fight against cyber breaches, companies are at a steep disadvantage for many reasons. First, the internet was not designed with security in mind. It grew out of an experiment to send messages between researchers’ computers over a network. And its users grew so fast that the network, established on a foundation of collaboration and trust, remained a platform where its users are largely on their own to defend against cyber-attacks.</p>
<p>Second, cybercrime is a low cost, high reward endeavor. Cybercriminals can operate from anywhere, and with impunity in many countries that tolerate and even encourage attacks against the West. Cybercrime is a profitable enterprise with a thriving marketplace for selling exploits (vulnerabilities that allow cyber criminals’ access to connected systems) as well as stolen personal information and trade secrets. To top it all off, well-funded, government-sponsored actors have been blamed for several high profile hacks.</p>
<p>Third, cybersecurity is expensive, constantly evolving, and complex, especially for established companies relying on antiquated technology. Industry researchers are in a race to identify and patch vulnerabilities before cyber criminals can exploit them. In the fight against cyber breaches, every employee and connected device is a potential access point.</p>
<p><strong>Legislative Response – Sanctions</strong></p>
<p>Legislators around the world have addressed the increased frequency of cyber breaches, often by slapping fines on companies they deem to have done too little to prevent them. Under Europe’s General Data Protection Regulation (GDPR), the UK regulator just proposed a fine of £99 million against Marriott in response to a cyber breach it reported in November 2018. <a href="https://www.zasio.com/age-of-cyber-breach-and-the-value-of-information-governance/#_ftn2" name="_ftnref2" data-wpel-link="internal">[2]</a>  The UK regulator also proposed a fine of £183.39 million against British Airways in response to a cyber breach it reported in September 2018.<a href="https://www.zasio.com/age-of-cyber-breach-and-the-value-of-information-governance/#_ftn3" name="_ftnref3" data-wpel-link="internal">[3]</a> Proposed new state privacy laws in the United States would, if passed, also increase the cost of incurring a cyber breach.</p>
<p><strong>Cyber Security Efforts and the Value of Information Governance (IG)</strong></p>
<p>As companies move to upgrade their systems to add levels of security to company information, their efforts will be diminished if they retain that information too long or if employees save copies of that information to unofficial locations. Cybercriminals that trick an employee into clicking on a phishing email may have an easier time accessing and removing company information from an employee’s unencrypted device than from an encrypted server. And if the cybercriminal successfully uses that employee’s credentials to access the encrypted server, the loss may be much greater if the company did not routinely dispose of unneeded information.</p>
<p>One tenant of good cybersecurity is good Information Governance (IG). Companies with good IG practices understand what data they have and are empowered to (1) destroy what they don’t need and (2) to protect and maximize the value of the information they do need. By identifying and destroying unneeded information (or information being kept without a legal or operational justification), companies reduce the amount of information that can be compromised. These actions also save companies money on storage and legal discovery costs and reduce legal exposure.</p>
<p>Good IG practices involve:</p>
<ul>
<li>establishing internal <strong>policies</strong> for managing what information is kept, where and how it is kept, and for how long;</li>
<li>implementing the right <strong>technology</strong> to track, manage, and dispose of records effectively;</li>
<li>establishing <strong>clearly defined roles</strong> for anyone creating, storing, sharing, or disposing of information; and</li>
<li>establishing <strong>procedures</strong> that allow companies to meet legal and regulatory compliance by dictating how information should be managed, stored, shared, and disposed of.</li>
</ul>
<p>Establishing and adhering to good IG practices is not easy, but it is increasing vital to the health and productivity of organizations in the age of the cyber breach.</p>
<p>&nbsp;</p>
<p><a href="https://www.zasio.com/age-of-cyber-breach-and-the-value-of-information-governance/#_ftnref1" name="_ftn1" data-wpel-link="internal">[1]</a> <em>Data Breach Level Index</em>, Gemalto (Last accessed July 16, 2019), https://breachlevelindex.com/.</p>
<p><a href="https://www.zasio.com/age-of-cyber-breach-and-the-value-of-information-governance/#_ftnref2" name="_ftn2" data-wpel-link="internal">[2]</a> <em>Statement: Intention to fine Marriott International, Inc more than £99 million under GDPR for data breach</em>, Information Commissioner’s Office (Last accessed July 16, 2019), https://ico.org.uk/about-the-ico/news-and-events/news-and-blogs/2019/07/statement-intention-to-fine-marriott-international-inc-more-than-99-million-under-gdpr-for-data-breach/.</p>
<p><a href="https://www.zasio.com/age-of-cyber-breach-and-the-value-of-information-governance/#_ftnref3" name="_ftn3" data-wpel-link="internal">[3]</a> <em>Intention to fine British Airways £183.39m under GDPR for data breach</em>, Information Commissioner’s Office (Last accessed July 16, 2019), https://ico.org.uk/about-the-ico/news-and-events/news-and-blogs/2019/07/ico-announces-intention-to-fine-british-airways/.</p>
<p>&nbsp;</p>
<p><em>Disclaimer: The purpose of this post is to provide general education on Information Governance topics. The statements are informational only and do not constitute legal advice. If you have specific questions regarding the application of the law to your business activities, you should seek the advice of your legal counsel.</em></p>
<p><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fzasio.com%2Fage-of-cyber-breach-and-the-value-of-information-governance%2F&amp;linkname=The%20Age%20of%20the%20Cyber%20Breach%20and%20the%20Value%20of%20Information%20Governance%20%28IG%29" title="Facebook" rel="nofollow noopener external noreferrer" target="_blank" data-wpel-link="external"></a><a class="a2a_button_x" href="https://www.addtoany.com/add_to/x?linkurl=https%3A%2F%2Fzasio.com%2Fage-of-cyber-breach-and-the-value-of-information-governance%2F&amp;linkname=The%20Age%20of%20the%20Cyber%20Breach%20and%20the%20Value%20of%20Information%20Governance%20%28IG%29" title="X" rel="nofollow noopener external noreferrer" target="_blank" data-wpel-link="external"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fzasio.com%2Fage-of-cyber-breach-and-the-value-of-information-governance%2F&amp;linkname=The%20Age%20of%20the%20Cyber%20Breach%20and%20the%20Value%20of%20Information%20Governance%20%28IG%29" title="LinkedIn" rel="nofollow noopener external noreferrer" target="_blank" data-wpel-link="external"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share#url=https%3A%2F%2Fzasio.com%2Fage-of-cyber-breach-and-the-value-of-information-governance%2F&#038;title=The%20Age%20of%20the%20Cyber%20Breach%20and%20the%20Value%20of%20Information%20Governance%20%28IG%29" data-a2a-url="https://zasio.com/age-of-cyber-breach-and-the-value-of-information-governance/" data-a2a-title="The Age of the Cyber Breach and the Value of Information Governance (IG)" data-wpel-link="external" rel="external noopener noreferrer"></a></p><p>The post <a href="https://zasio.com/age-of-cyber-breach-and-the-value-of-information-governance/" data-wpel-link="internal">The Age of the Cyber Breach and the Value of Information Governance (IG)</a> appeared first on <a href="https://zasio.com" data-wpel-link="internal">Zasio</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://zasio.com/age-of-cyber-breach-and-the-value-of-information-governance/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
