HOUSTON – Law firms have been duly warned in recent years that their systems have been attacked (hacked) and breached and that the attacks will likely escalate and intensify. Recent developments present very real evidence that these warnings, from many sources, including the F.B.I., have been accurate and even understated. These developments should be a loud and clear wake-up call to law firm management to intensify efforts to secure the treasure trove of highly confidential, sensitive, proprietary and often privileged client and employee information. After all, client confidentiality is the life’s blood of any attorney’s practice.
* The FBI began warning firms that they were specifically being targeted by organized cybercriminals as early as 2009, and in 2011 invited 200 of the largest law firms to discuss the rise in sophisticated cyber-attacks targeted at law firms. Part of the reason for this is that law firms often present an easier target than some of their clients; if a hacker wants to steal sensitive information from a company, he may have better luck going after that company’s outside counsel.
* 2015 was the first year that the legal sector appeared on Cisco’s annual ranking of industries targeted by hackers—debuting at number 6. Law firms’ clients are taking notice. Many financial institutions now require law firms to complete checklists and subject themselves to audits of their information security apparatus.
(TNS) - Rae Ann Brutger stood on her doorstep and wept.
The tornado had shoved her home 10 feet off its foundation, leaving her living room at a crazy tilt. She surveyed the damage, stepping cautiously over the smashed snowman figurines she had spent decades collecting and the family photos that had spilled out of an off-kilter cupboard.
“I sincerely realize it could have been much worse,” she said, wiping her eyes and nodding toward her neighbor’s place. The tornado that ripped though the Litchfield mobile home park flattened the double-wide trailer next door, leaving it an almost unrecognizable twist of metal.
The twister was one of four that roared through central Minnesota Monday afternoon, part of a storm that dumped up to 9 inches of rain in spots across north central Minnesota, washing out roads, overrunning highways, leaving neighborhoods in tatters and raising fears of flash flooding across the region.
In our fast-moving digital age, many organizations are still struggling with an “analog” approach to crisis management, using hard-copy documents and tabletop exercises to prepare for the next potential emergency.
This makes training employees particularly difficult, because both businesses and the threats they face are growing and evolving all the time. It is nearly impossible to constantly update hard-copy crisis management plans—let alone repeatedly disseminate them to hundreds or even thousands of employees.
It’s no wonder that many companies are incorporating technology into their crisis management prep as often as possible.
Here, we look at four ways technology can benefit your organization’s crisis management training efforts:
There are multiple areas of potential risk in data center environments that can cause incidents resulting in an insurance claim. Risks include:
- Accidents that damage the facility
- Potential for workplace injuries
- Business risks from downtime events that impact the data center’s or its customers’ business continuity.
Organizations depend on 24 x 7 x 365 IT infrastructure availability to ensure that services to customers/end-users are available whenever needed.
Europe’s preferred IT provider retains first place UK ranking in IT outsourcing satisfaction survey, leading competitors
LONDON – Computacenter, Europe’s preferred IT provider to enable users and their businesses, today announces that it has retained its number one ranking in satisfaction ratings for end user services for the third year running in the UK Whitelane Outsourcing Study 2016. Computacenter ranked higher than the likes of HP, IBM and Atos, receiving a satisfaction percentage of 76% for end user services, 8% higher than the market average.
The study, conducted by Whitelane, surveyed 250 participants of the top IT spending organisations in the United Kingdom to evaluate over 800 unique IT outsourcing contracts. In total, 27 IT service providers were ranked based on their clients’ perception with fluctuating contract numbers per provider.
The study revealed that 90% of customers surveyed would renew their contract with Computacenter, which saw the company claiming the number one place in this category. From an overall European perspective, Computacenter climbed to second place in end user satisfaction rankings, scoring 7% higher than market average with a score of 77%.
Kevin James, UK Managing Director, comments: “This is further proof of the continued devotion to customer centricity and collaboration here at Computacenter – a focus that we will continue to build on even further. Our ongoing devotion to understanding client requirements and truly collaborating throughout the lifecycle of the relationship, combined with our specialist teams and suite of services and solutions, has allowed us to exceed expectations.”
When considering contract size against satisfaction rate, Computacenter, for the second year running, ranked proportionally higher than the market average. The study analysed satisfaction ratings across contracts with an annual contract value (ACV) of less than £10 million, and more than £10 million. For both, Whitelane found that Computacenter were significantly ahead of the market average, and its competitors.
Kevin James concludes: “Overall we are delighted to have again been recognised as the top performing organisation for end user services, which are at the very heart of our strategy. We at Computacenter take pride in receiving such great feedback from our customers and use this as a foundation for continuous improvement.
We aim to set the industry standard for customer satisfaction and contract renewals, which inevitably are inextricably linked. We are excited and proud of the survey results, which are a validation of our ‘customer first’ mantra.”
Computacenter is Europe's leading independent provider of IT infrastructure services, enabling users and their business. We advise organisations on IT strategy, implement the most appropriate technology, optimise its performance, and manage our customers’ infrastructures. In doing this we help CIOs and IT departments in enterprise and corporate organisations maximise productivity and the business value of IT for internal and external users.
Rooted in core European countries Computacenter combines global reach with local expertise.
SOS Builders Receives “Contractor of the Year,” 10 Companies Honored with Golden Hammer Awards
WHEELING, Ill. – Eleven Response Team 1 companies received prestigious recognition at the recent 2016 Contractor Connection Conference & Expo in Las Vegas. Contractor Connection is the largest, fully independent network of managed contractor repair for insurance companies and consumers. Response Team 1 is the nation’s second largest residential and commercial property restoration and renovation company serving the continental U.S. from 49 strategic locations.
SOS Builders of Phoenix was recognized as the top company in the Southwest District by winning a distinguished “Contractor of the Year” award in the general contractor category. This top honor is selected by region from all of the Golden Hammer award winners.
Ten Response Team 1 companies received a distinguished 2016 Crawford Connection Golden Hammer – Excellence in Achievement Award for ranking in the top 200 of the more than 4,000 contractors in the U.S. and Canada. This special recognition is awarded based on performance criteria and overall quality of service and professionalism. The Response Team 1 companies honored were:
· Cary Reconstruction Company – Charlotte
· Cary Reconstruction Company – Fayetteville, N.C.
· Cary Reconstruction Company – Greensboro, N.C.
· Cary Reconstruction Company – Greenville, S.C.
· Cary Reconstruction Company – Norfolk, Va.
· Empire Construction & Technologies – Irvine, Calif.
· Emergency Restoration Experts – Phoenix
· Poole’s Reconstruction Company – Charlotte
· SOS Builders – Phoenix
· Universal Restoration Services – Lawrenceville, Ga.
In addition to the Contractor Connection awards, Empire Construction & Technologies of San Marcos, California, was awarded an “Outstanding Member of Service Award” from insurance company USAA in recognition of excellence in customer service. The criteria for selection included high work volume, customer satisfaction, deadline adherence and excellence in both estimating and workmanship.
“These awards from Contractor Connection and USAA are a direct reflection of our ongoing mission to provide optimal customer service and meet and exceed customer expectations,” said John Goense, Chairman and CEO of Response Team 1. “We could not have achieved this recognition without the hard work and commitment of our employees throughout the country.
“We are proud of our partnerships with both Contractor Connection and USAA and this prestigious awards program that honors industry excellence,” Goense added.
About Response Team 1
Response Team 1 is an award-winning national leader in the commercial and residential property restoration, disaster loss recovery and multifamily renovation industries. We are committed to getting life back to normal quickly and correctly for our customers. With decades of experience in quickly responding to large commercial and residential losses and community weather events, Response Team 1 serves the continental U.S. from 49 strategic locations.
More information is available at www.responseteam1.com.
About BridgeHead Software
Original Team That Created SAMMA to Offer Continued Support and Introduce Cutting Edge Access Technology
AGOURA HILLS, Calif. – GrayMeta, a provider of metadata and digital asset management solutions to the world's leading media companies and the only authorized provider of SAMMA support for hardware and software, today announced it would once again provide world-class SAMMA support and predictable pricing following Oracle's discontinuation.
HONG KONG, CHINA – Trend Micro Incorporated (TYO: 4704; TSE: 4704), a global leader in security software and solutions, today announced it will host its second annual Capture the Flag (CTF) cybersecurity competition for engineers. Following the company's successful, first-ever CTF for the security community in the Asia-Pacific region, the 2016 event will be hosted for engineers worldwide.
Trend Micro CTF 2016 will test players' technical knowledge in various categories, such as targeted attacks, Internet of Things (IoT), Industrial Control Systems (ICS) and Supervisory Control and Data Acquisition (SCADA), which are all becoming increasingly important in the cybersecurity space1. The competition comprises an online qualifying event and finals held in Tokyo, Japan.
"Trend Micro aims to create a world safe for exchanging digital information, and expert events, such as this, are one way we work toward this goal," said Eva Chen, CEO for Trend Micro. "Challenging engineers from across the globe to stretch their cybersecurity knowledge in these specific, relevant areas will help bolster the security community as a whole."
The online qualifier will be played in a "Jeopardy" format in which players will compete by solving challenges in various categories. The top ten teams from the online qualifier will advance to compete in the final, which will be played in an "attack and defense" format. The final winning team will be awarded JPY1,000,000 (approximately US$9,800), plus Zero Day Initiative Rewards Program 2 points.
Trend Micro CTF 2016 Online Qualifier
Dates: July 30-31, 2016 (Game starts at 13:00 (JST, 4:00 UTC), July 30, 2016)
Requirements: Participants must be at least 20 years old
Team registration: From July 15, 2016 (JST)
Trend Micro CTF 2016 Final
Dates: November 19-20, 2016 (JST)
Requirements: The top ten teams from the online event will qualify. Each team may have a maximum of four players.
Format: Attack and Defense (additional details to be announced following online qualifier)
Venue: Shinjuku NS Building, Tokyo, Japan
First Place Team: US$9,800 per team, a one-time bonus of US$2,000, automatic qualification for HITCON CTF 2016 Final in Taiwan
Second Place Team: US$3,000 per team
Third Place Team: US$2,000 per team
To register for the online qualifier, please visit: http://www.go-tm.jp/ctf2016_en
For more information about the event, please visit: http://www.go-tm.jp/ctf2016_en
About Trend Micro
Trend Micro Incorporated, a global leader in cyber security solutions, helps to make the world safe for exchanging digital information. Our innovative solutions for consumers, businesses, and governments provide layered security for data centers, cloud environments, networks, and endpoints. All our products work together to seamlessly share threat intelligence and provide a connected threat defense with centralized visibility and control, enabling better, faster protection. With more than 5,000 employees in over 50 countries and the world's most advanced global threat intelligence, Trend Micro enables organizations to secure their journey to the cloud. For more information, visit www.trendmicro.com.
1 Challenge format and categories may be subject to change.
U.S. Patent No. 9,244,627 B2 Attracts Attention to Ongoing Industry Data Breach and Sanitization Challenges
KANSAS CITY, Mo. – Synetic Technologies, Inc. (Synetic), a global leader in secure IT Asset Disposition (ITAD) and value recovery services, has been granted U.S. Patent No. 9,244,627 B2 for a scalable enterprise data erasure system and method for the sorting, tracking and certified erasure of a plurality of data storage devices through use of enterprise hardware and software designed for data storage. The Virtual Data Annihilator platform sets a new standard for transparency in the ITAD industry by addressing the ongoing challenges of data security breaches caused by improper and unverified disposal processes.
Verizon's 2016 Data Breach Investigations Report found that residual data on reused hardware was a common cause of company data breaches. For companies handling sensitive information, this can lead to expensive legal issues.
Ron Helmer, CEO of Synetic, said, "When companies sell old hardware for value recovery, it is imperative that data be completely wiped from the system before it is reused. Many companies entrust this process to third party value recovery services, but without a transparent verification process, confidential client information and other sensitive data may still be at risk."
Data sanitization remains the preferred method for organizations seeking to recover maximum value from their off-network IT assets. While organizations can perform their own data sanitization, it often comes with a greater financial cost and security risk.
Helmer added, "To this point, most ITAD firms have leveraged third party software solutions to sanitize data, which include licensing fees per use. While the end result is the same with Virtual Data Annihilator, owning the platform allows us to deliver these same services cost effectively at scale, which delivers our clients greater value. Virtual Data Annihilator is infinitely scalable, and deployable onsite, allowing us to tailor data destruction programs to meet the data security needs of any client."
Synetic's patented Virtual Data Annihilator platform securely sanitizes data storage devices and produces searchable log files of the entire sanitization process to certify complete data erasure. The erasure system complies with both the DoD 5220.22-M and more recent NIST SP 800-88 Revision 1 standards. Synetic also designed a separate system, QCC, which automates the testing of sectors from drives wiped by the Virtual Data Annihilator and exceeds NIST 800-88 recommended standards for sectors checked. Additionally, Synetic provides notarized certificates of data destruction to its clients, which are available via the Synetic client portal.
"One of Synetic's well-known technology clients had a strict security requirement to shred all drives onsite, but through education, due diligence and verification, this client changed their information security stance on shredding, leveraging the Virtual Data Annihilator sanitization platform instead," Helmer explained. "We now wipe all drives for this client, which has significantly increased their value recovery from decommissioned assets."
Synetic offers a full suite of ITAD services to Fortune-listed leaders in healthcare, finance, technology, education and retail. ITAD services include certified data destruction; secured transport, testing and refurbishing of IT assets; remarketing; R2 certified e-waste recycling; and comprehensive reporting. Synetic offers both virtual and physical data destruction under the Data Annihilator brand.
For a limited time, Synetic is offering free Google Cardboard Virtual Reality Viewers to celebrate the Virtual Data Annihilator patent. Details are available at www.sti3.com/vr.