Tag Archives: ponemon

Incident Response Plan Saves Money

The Ponemon Institute recently completed research, sponsored by IBM Resilient, entitled “The 2019 Cyber Resilient Organization,” which surveyed more than 3,600 security and IT professionals around the world to determine organizations’ ability to maintain their core purpose and integrity in the face of cyber-attacks. According to IBM, the research found that “a vast majority of … Continue Reading

Think Like a Hacker

I was with a bunch of CFOs this week talking about cybersecurity and I told them how easy it is for hackers these days. They can infiltrate a company’s system by compromising an O365 account that doesn’t have multi-factor authentication, and according to a Ponemon study, are in the company’s system for over 200 days. … Continue Reading

Health Care Industry Continues to Fight Cyber-Attacks at Alarming Rate—Health Care Data Breaches Cost Average of $408 Per Record

It is clear that the health care industry continues to be targeted with cyber-attacks. In 2018, the 10 largest health care breaches, outlined here, include unauthorized access to protected health information (PHI) through a vendor offering claims processing, ransomware incidents, successful phishing schemes, mailing PHI to wrong addressees, hacking, a misdirected email, and a lost … Continue Reading

New IBM/Ponemon Study Shows Low Organizational Cyber Resilience

A new IBM/Ponemon Study released late last week, 2016 Cyber Resilient Organization, reveals that only 32 percent of IT and security professionals believe that their organization has a “high” level of cyber resilience. The study interviewed 2,400 IT and security personnel across the world. The study shows that 66 percent of those professionals believe that … Continue Reading

Raytheon/Ponemon survey confirms companies wait until an event to hire a data security vendor

The results of a Raytheon commissioned Ponemon study released on June 7, 2016, shows that at least two-thirds of businesses wait until they have experienced a cyber-attack or data breach to hire and retain security vendors to help. That statistic is consistent with this writer’s experience. The survey, entitled “Don’t Wait: The Evolution of Proactive … Continue Reading
LexBlog