
Cloud Vendor Breach Harms Philanthropists

element. Don’t add more than one Google tag to each page.
Because Security Gives Us Freedom.
Stelios Valavanis, founder and CEO of onShore Security, sat down recently with Scott Becker of the Becker Group to talk about cybercrime, startups, and empowering people with technology on the Business Leadership podcast. To listen to the interview, please click here or click on the image above.
Over the last few months, cyber security issues may have taken a backseat to health and economic issues. Thankfully, there has not been a major cyber incident during the coronavirus pandemic.
“Illinois schools must comply with the Student Online Personal Protection Act by July 1, 2021.”
The following is a guest blog by Todd M. Rowe, published with the author’s permission. Click here to read the original post at Tressler LLP.
“…[T]he vast majority of the recent cases are limited to allegations brought by employees against their employers rather than by customers. That is, the case law is developing into two distinct branches: BIPA customer cases and BIPA employment cases.”
The following is a guest blog, published with the author’s permission. Click here to read the original post at Tressler LLP.
Illinois Schools Should Immediately Take Steps To Comply With New Privacy Laws Related To Student Data Todd Rowe – Partner, Tressler LLP While protecting data is always important, there is a heightened effort to protect private data belonging to children and young adults. Unfortunately, there has also been a recent uptick in the number of recent breach incidents involving data from schools and vendors entrusted with data by schools. Of course, this data held by schools inevitably includes information belonging to children and young adults. Perhaps the worst incident involving students’ data was seen this summer when it was discovered…
“The Illinois Biometric Information Protection Act (“BIPA”) has had a significant impact on how employers use timekeeping systems to track employees’ hours at work.”
The following is a guest blog, published with the author’s permission. Click here to read the original post at Tressler LLP.
“It was a quaint, innocent time before social engineering scams, ransomware or any of the other threats had evolved to hassle both large and small data collectors. In 2014 and 2015, large-scale data breaches at Home Depot, Best Buy and Target roamed the Earth.”
The following is a guest blog, published with the author’s permission. Click here to read the original post at Tressler LLP.
“Recently, the Chicago Tribune reported on a data breach involving student data stored by Pearson Clinical Assessment that may have involved a number of students at Illinois schools.”
The following is a guest blog, published with the author’s permission. Click here to read the original post at Tressler LLP.
Ransomware, one of the most prevalent cybersecurity threats, has been making big news by crippling governmental organizations and large corporations with household names, but the story has started to change. Hackers have turned their low-effort but highly successful scams on minor municipalities and small business. Almost half of all breaches last year targeted small businesses. Prevention is essential in helping organizations avoid having their data held hostage by ransomware attackers, but your organization, your team, and your network need to be prepared for post-breach possibilities. Ransomware infections rapidly spread laterally from host to host in an attempt to bring…
Last week, onShore Security’s Caron Grantham attended GirlCon Chicago, which we were proud to sponsor. GirlCon Chicago “was a really engaging event for the teen students”, says Caron, after the event at Google Chicago. Students attending the event ate lunch with cybersecurity practitioners and their peers, encouraged to ask questions of the professionals in attendance. Caron met some students from her high school alma mater; Kenwood Academy College Prep, as well as students from Lindbloom, King College Prep, and Walter Payton College Prep. Caron engaged with the students and discussed their interest in computer science and cybersecurity. After lunch, Caron…
“Biometric data is playing a larger role in employment law as more employers begin using equipment to scan employees’ fingerprints to clock in for work.”
The following is a guest blog, published with the author’s permission. Click here to read the original post at Tressler LLP.
Biometric data is playing a larger role in employment law as more employers begin using equipment to scan employees’ fingerprints to clock in for work.
If you’ve modernized your network or are considering it, you know that security should be your top concern. Even if you’re using or are considering SD-WAN, there are security risks and challenges that you must consider: Egressing of traffic may not be inspected with critical advanced firewall capabilities. Internal traffic between sites may not be adequately protected. Network modernization solutions, including SD-WAN, may provide a false sense of security. No matter where you are in your network modernization journey, onShore Security provides a fully integrated, cloud-based network and security service that closes critical security vulnerabilities. We’d like to invite you to a live…
Our CEO, Stelios Valavanis, sat down for an interview with BizCastHQ to talk about onShore’s history and innovations in developing our cybersecurity practice to best serve our clients. Our tenacity, grit, and inventiveness have allowed us to enable clients in ways that have changed the industry. Stel’s biggest tip: be vocal and transparent. Our ability to communicate with stakeholders at every level of a project and listen to their concerns allow us to work with your team comfortably and efficiently. To see the whole interview, watch below or click here to visit BizCastHQ’s profile of Stel. Stel Valavanis – Founder &…
The next evolution of onShore’s managed security service offers three levels of cybersecurity protection, including the newly developed, affordably-priced, entry level Security Management & Reporting as well as Managed Detection & Response (MDR) and Security Orchestration
Our next evolution of Panoptic Cyberdefense managed security service is now available.
To address the cybersecurity needs of small and mid-size banks, onShore created Panoptic Cyberdefense entry-level service, Security Management & Reporting with many higher-level features such as analysis and firewall reporting. Banks and other heavily regulated industries will appreciate the addition of continuous Compliance Violation Detection.
George Quinlan has joined Chicago-based onShore Security as a Senior Security Consultant, bringing more than 26 years of security, GRC, IT infrastructure, network security, and engineering experience to our portfolio of cyberdefense and governance services.
The addition of Quinlan to our Cybersecurity Leadership Team comes as onShore completes the reorganization of our security solutions to allow businesses of all sizes to benefit from a deep and comprehensive security portfolio typically unavailable to all but the largest enterprises.
The following is a guest blog, published with the author’s permission. Click here to read the original post at Tressler LLP.
While some courts have found coverage for data breach claims under CGL policies, there should be little dispute that the best way to limit risk is to obtain a cyber policy rather than hoping for coverage under a CGL policy.
“The National Bank of Blacksburg lost $2.4 million to Russian hackers and its insurer only wants to reimburse it $50,000, according to a lawsuit the bank filed in U.S. District Court in Roanoke,” stated The Roanoke Times on July 26, 2018.
How could they have protected their assets more effectively? What gaps do they still have with their cybersecurity? Unless they conduct a cybersecurity audit, gaps may still exist that could be exploited with fraudulent transactions and ransomware.
On, March 1, 2019, all banks, other regulated entities and persons regulated and licensed through the Department of Financial Services (DFS) must be in compliance with the requirements of 23 NYCRR 500.11.
If you do business in New York State—and who doesn’t?—these NYDFS cybersecurity requirements apply to you; your bank must be in compliance.
After tricking employees into opening emails that gave them access to debit card account numbers at National Bankshares of Blacksburg, Virginia, Russian hackers stole $2.4 million from hundreds of ATMS across the country in 2016 and 2017, news accounts say.
To make matters worse, the bank’s insurer has offered only $50,000 to cover the loss, a dispute that is now in federal court.
Taking your insurance company to court is one way to reduce your cyber security losses. A better way is to arm yourself against such losses in the first place. At onShore Security, we have 20 years experience in protecting banks from cyber intrusions and a comprehensive system of detection, analysis, and ongoing vigilance that builds security, inside and out. Learn more from our CEO in the video below.
The following is a guest blog, published with the author’s permission. Click here to read the original post at Tressler LLP.
Courts have generally defined “spoofing” as “the practice of disguising a commercial e-mail to make the e-mail appear to come from an address from which it did not originate. Spoofing involves placing in the ‘from’ or ‘reply-to’ lines, or in other portions of e-mail messages, an email address other than the actual sender’s address, without the consent or authorization of the user of the e-mail address whose address is spoofed.”
A question we’ve been asked recently is why an IPS isn’t sufficient to protect a financial institution (or any organization) from a DDOS attack. The explanation is quite simple, with an understanding of what a DDOS attack is and what an IPS is and does.
Recently, it was revealed that more than 500,000 routers in 54 countries were infected with the VPNFilter malware. VPNFilter has new capabilities, including the ability to perform an active man-in-the-middle attack. In our latest videoblog, Stel discusses the network detection that is necessary to protect your business from this attack.
The following is a guest blog, published with the author’s permission. Click here to read the original post at Hogan Injury.
Technology has come a long way. The advancement of technology has paved the way for much more development in the fields of medicine, transportation, economics, finance, and many more. Along with the multitude of benefits that came with the rapid growth of technology came some issues, one of which is cybersecurity.
onShore Security’s background in software development and experience as an ISP has helped us to push our security monitoring far beyond what many others offer. In his newest video blog, Stel discusses what real security monitoring is and how we’ve built our platform.