Incident Response is a series of investigative and remedial steps that a company takes in the event of a breach or other security incident. These restoration efforts can include backtracking through log data, isolating affected machines, and even negotiating with cyberterrorists!
Investigating and Responding to Ryuk Cyberattack in 2020
Topics: Cybersecurity, Data Breach, Incident Response, security incident handling, security incident response
Cybersecurity breaches are becoming more and more prevalent. In fact, it’s been estimated that there were almost 5 billion records breached in 2018. Many organizations spend thousands of dollars on security breach prevention tools, but won’t take the time to create a formal process of identifying, responding to, and communicating an incident.
Topics: Cybersecurity, Data Breach, Data Security, Incident Response, security incident handling, security incident response
U.S. Federal Bureau of Investigation (FBI) Special Agent Jeffrey Huber, who runs point on cybersecurity for the state of Iowa, was on hand at a recent ProCircular roundtable to talk about the FBI’s Cyber Division and its role in addressing cybercrime.
Topics: Data Breach, Incident Response, hacking, FBI
More than 200 IT and technology leaders from hospitals, schools, and businesses in eastern Iowa came together last month at the Business Technology Conference in Coralville, Iowa – hosted by systems integration firm CEC (Communications Engineering Company) – to learn about new technology and how it can improve processes, profit, and efficiency.
Many types of technology were showcased at the event, but there were plenty of conversations about cybersecurity.
Topics: Cybersecurity, Data Breach, Vulnerability Assessment, Business Technology Conference
Cybersecurity: What All Companies Need to Think About
There’s something powerful about bringing a roomful of Iowa technology professionals together to talk about forward-thinking ideas. You quickly realize how cybersecurity and data breaches truly impact every organization and everyone – and that no organization is ever too small to have a plan.
Topics: Cybersecurity, Data Breach, Iowa Tech Summit, Quantum Computing, Digital Rights Management