Based on Sensitivity Based on Regulatory Requirements
Author Archives: Aayush Goel
Monthly Round Up for the month of November 2024
Insurance Administrator Landmark Admin Ransomware Data Breach Impacted Over 800,000 People Landmark Admin, a third-party insurance administrator, has confirmed a data breach. The May 2024 ransomware attack affected nearly one million customers. “The forensic investigation determined that data was encrypted and infiltrated from Landmark’s system,” the company said. Canada faces a cybersecurity crisis with criticalContinue reading “Monthly Round Up for the month of November 2024”
Vulnerability Management
It is not a scan or a one-time project. Vulnerability Management is a “program” which organizations might use. The goal is to continuously identify vulnerabilities. Then, they must address these vulnerabilities in appropriate ways. It can contain many different projects like: What, Why and How? It is the process of identifying, analyzing and ranking vulnerabilities.Continue reading “Vulnerability Management”
Monthly Round Up for the month of September 2024
Ransomware attack forces high school in London to close and send students home A high school in south London has announced it will be closed for the first half of this week due to a ransomware attack, leaving approximately 1,300 students in the lurch. Students were sent home from the Charles Darwin School on Thursday,Continue reading “Monthly Round Up for the month of September 2024”
Monthly Round Up for the month of August 2024
ADT confirms data breach after customer info leaked on hacking forum ADT, a leading American company in building security, has confirmed a data breach incident. The breach involved threat actors who allegedly leaked customer information on a well-known hacking forum. ADT, a publicly traded company, focuses on providing security and smart home solutions to bothContinue reading “Monthly Round Up for the month of August 2024”
Monthly Round Up for the month of July 2024
AT & T cyber attack A massive AT&T Cyberattack caused Hackers to Steal Millions of Customer Records. Consequently, AT&T revealed that nearly all of its wireless customers’ call and text records were exposed. Furthermore, the hackers accessed customer data stored on a third-party cloud platform. Patient reports used as paper plates at Mumbai hospital A videoContinue reading “Monthly Round Up for the month of July 2024”
Monthly Round Up for the month of June 2024
Synnovis Cyber Attack: A ransomware attack on Synnovis, a pathology laboratory in the UK, severely impacted NHS services in South East London. This attack led to the postponement of over 800 elective procedures and 700 outpatient appointments between June 3 and June 9, 2024. The recovery process is ongoing, and NHS England is working withContinue reading “Monthly Round Up for the month of June 2024”
Information Security Clauses for business contracts and agreements
In line with ISO 27001 and NIST. General Clauses Confidentiality and Data Protection: a. The Vendor shall treat all data and information provided by [Company Name], including but not limited to personal data, intellectual property, and confidential business information, as strictly confidential and shall not disclose, share, or use such data and information for anyContinue reading “Information Security Clauses for business contracts and agreements”
WiFi Security
WiFi is an acronym for ‘Wireless Fidelity’ which is one of methods by which computer/device may connect to the internet with out the use of wires. This is a technique of communication between the devices like routers, Computers, tablets, smartphones and other related hardware it makes use of radio frequencies. Security Risks and WiFi ThreatsContinue reading “WiFi Security”
Phases of Audit
Below is the diagram to demonstrate steps involved in an audit: The following documents can be used as reference: Audit Checklist Audit Plan Sample Policy Format Audit Report Template Risk Register Statement of Applicability (SOA)
