SecureLink Blog

What are the biggest cybersecurity trends impacting Enterprise organizations in 2018?

January 11, 2018 A new year brings with it new challenges as well as new opportunities. 2018 is no different. For enterprise organizations, cybersecurity challenges will continue to be front and center as third-party vendors continue to be a doorway into the enterprise, hacking becomes even more mainstream as Billy in his parents’ basement has […]

wannacry global ransomware attack

New Study Reports Non-Compliance Costs Twice as Much as Toeing the Line

December 27, 2017 Fluctuating government and industry regulations combined with the upcoming enforcement of the EU General Data Protection Regulation (GDPR) create a tough-to -meet environment for many IT managers. A new report from the Ponemon Institute details the current costs of compliance—and non-compliance—across industry. We talked earlier about the impending requirements associated with the […]

How to Prepare for GDPR with Third Party Vendors

December 20, 2017 As the deadline for compliance with the EU’s General Data Protection Regulation (GDPR) approaches, it is critical to remember you are liable for the compliance of your vendor partners as well. We talked in a previous blog about big changes underway as companies and providers work to comply with the May 2018, […]

Six Months and Counting—How GDPR Impacts Third-Party Management

December 6, 2017 In May, 2018, the European Union’s General Data Protection Regulation (GDPR) goes live. The regulation, which is intended to “harmonize data privacy laws across Europe,” has American companies pushing toward compliance. Have you updated your third-party vendor agreements lately? Long concerned with data privacy and protection, the European Commission passed the GDPR, […]

National Cyber Security Awareness Month

Open Door Policies – Problems with how privileged credentials are managed

November 28, 2017 A new survey takes a look at how IT professionals are managing privileged credentials and identity access. How does your network access management compare? Privileged accounts are used to identify users with high-level network access. The login credentials of your administrators are an attractive target for bad actors. Too often, login credentials […]

twitter two-factor authentication

Why You Should Care that the President’s Twitter Account was Temporarily Disabled

November 21, 2017 Platform security may suffer as the tech industry increasingly turns to third-party contractors. Twitter found that out the hard way when a contractor pulled the plug on the personal email account of President Trump. On November 2, a third-party contractor deactivated the personal Twitter account of President Trump on their last day […]

This Is Why You Need Effective Audit Trails

November 13, 2017 Do You Use Third-Party Vendors? How Effective is Your Audit Trail? Using a third-party vendor can be a cost-effective solution to fill a skills or services gap in your operation. But how do you know privileged access to your network is not costing you in dollars and data? Increased agility, scalability, and […]

81% of hacking-related breaches leverage compromised credentials

November 1, 2017 The 2017 Verizon Data Breach Report cites that 81% of hacking-related breaches leveraged either stolen and/or weak passwords, up from 63% reported in previous years. We often see news headlines of breaches involving compromised credentials that support these findings, so this report doesn’t shed new light on the issue. However, it should […]

data breach

How to Minimize The Growing Threat of Third-Party Breaches

October 17, 2017 A recent study reports that “data breaches caused by third parties are on the rise.” In fact, the Opus Ponemon study saw 56% of respondants experienced a third party breach. That marks a 7% increase from 2016. We continue to see evidence in the numbers and in the news that vendor risks […]

Hyatt Hotels suffers another POS attack

October 13, 2017 It was reported this week that Hyatt Hotels suffered another major data breach, the second in two years.  Attackers targeted the organization’s front desk Point-of-sale systems. When Hyatt’s security team noticed unauthorized access to payment card information, they saw that manually entered or swiped cards were the cause of the breach.  Hyatt’s global […]