The real cost of a cyber breach at your company…..Do CEOs really know?

Consider the top five most significant expenses that a business has to manage after a breach.

Remediation

In 2017 the Ponemon Institute reported it takes more than six months for an organization to find out they have had an intrusion and another 55 days to contain it. Remediation does not necessarily mean the attack has been completely stopped, either, as some attacks remain dormant and undetected.

Loss of customers

I told you Crypto wasn’t safe

This week the news of more Cryptojacking were published, the more I saw people shaming others or gloating about how unsafe, unreliable crypto currencies are. I felt a strong desire to write about this in the blog and I will talk more about it in my podcast next week. (See CyberHub Engage).

But for this blog post I want to talk about Crypto Jacking and why it’s happening as often in a product that’s supposed to be “safe”.

What’s Cryptojacking?

Penetration Testing will save Countless Lives: The Cisco Vulnerability

Embedi researchers have this week uncovered a critical vulnerability in Cisco software that left Cisco employees and researchers sleep-deprived, until it was fixed. Researchers demonstrated this susceptibility at a Hong Kong based conference after reporting it to Cisco in May 2017 in a video demonstration. The affected hardware and software includes devices that fall into the Smart Install Client type.