RH-ISAC Initiatives During Cybersecurity Awareness Month

As we close out a successful month celebrating Cybersecurity Awareness Month, we’ve been reflecting on all that we were able to accomplish. Cybersecurity Awareness Month is a collaborative effort between the government and industries to raise awareness about the importance of cybersecurity and ensure safe practices online. October is an excellent time for organizations to…

Read More

RH-ISAC Announces Commitment to Global Efforts Supporting and Promoting Online Safety and Privacy for Cybersecurity Awareness Month

WASHINGTON, D.C., September 1, 2020 — The Retail & Hospitality Information Sharing and Analysis Center (RH-ISAC) today announced its commitment to Cybersecurity Awareness Month, held annually in October, by signing up as a Champion and joining a growing global effort to promote the awareness of online safety and privacy. The Cybersecurity Awareness Month Champions Program…

Read More

Workforce Awareness During COVID-19

As the world scrambles to respond to the outbreak, more and more workers around the globe are working remotely in an effort to contain and mitigate the pandemic. This has opened new avenues for hackers, as in many cases the companies may not have the infrastructure or policies in place to support secure remote working,…

Read More

COVID-19 Phishing Campaigns

The cyberthreats following in the wake of the COVID-19 pandemic are not substantively different from the threats that security professionals have dealt with during other national or global calamities like the Indian Ocean tsunami, Amazon fires, floods, and hurricanes. Sophisticated cybercriminal, state-sponsored threat actors, and hacktivists have always taken advantage of widespread anxieties in times…

Read More

6 Best Practices for Data Breach Protection

Keeping your data safe and protected often seems like an uphill battle. Consistently presenting a hardened attack surface to a would-be attacker and doing so across all the various attack vectors possible is a difficult problem to solve. The attacker only has to be right once, while you and your broader security team have to…

Read More