Attacks/Breaches

3/1/2018
02:57 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Intersections Inc. Launches Data Breach Readiness Program for Small and Medium Sized Businesses

Specifically designed to help manage cyber threats and prepare businesses for data breach

Chantilly, VA-February 27, 2018  Intersections Inc. (NASDAQ: INTX), provider of Identity Guard®, the industry pioneer in identity theft protection services, today launched Data Breach Readiness, the first comprehensive data breach preparedness solution for small and medium sized businesses.

“The most devastating impacts of a data breach can only be avoided by both working to prevent a breach and by planning and preparing a response before an incident occurs,” said Jerry Thompson, Senior Vice President, of Intersections. “Identity Guard has helped companies manage data breaches for more than a decade, and we’ve distilled that experience into a robust package that helps businesses prevent or – in the worst case scenario – manage a breach.”

Businesses of all sizes face challenges in safeguarding their critical information. Small and medium-sized companies often lack the internal resources to dedicate towards preparedness, making them attractive targets for hackers. According to Small Business Trends, 43 percent of cyberattacks are aimed at small businesses.

Smart organizations are increasingly focusing on proactively identifying data breaches and preparing to efficiently react to them in advance of a data breach crisis. Identity Guard’s Data Breach Readiness service includes direct access to Delta Risk LLC, a Chertoff Group organization, which provides ongoing network assessments to identify potential vulnerabilities. Monthly scans help ensure early detection and resolution of developing security concerns.

 “Having an effective cybersecurity strategy is the single best way for organizations to mitigate the worst consequences of a significant data breach, and the Identity Guard Data Breach Readiness program brings such a strategy to small and medium sized businesses.” said Michael Chertoff, Delta Risk board member and executive chairman of The Chertoff Group.  

Identity Guard provides Data Breach Readiness clients with: 

  • All the information and templates needed to formulate a custom Data Breach Readiness Plan.
  • Vulnerability Scanning to identify network vulnerability issues.
  • Proprietary Identity Guard software tools to protect corporate and employee computers and phones from malicious attacks.
  • Dark Net Monitoring that scans for sensitive business information that may indicate a potential threat.
  • Training and Tools to educate employees on proper procedures for handling sensitive information to reduce the risk of a breach, including a dashboard to monitor participation.
  • Identity Guard’s signature Identity Theft Protection, available at a significantly discounted rate, which provides breach victims access to Identity Guard’s industry-leading monitoring and resolution features in the event of a breach. With 24/7 oversight capabilities, Identity Guard monitors more data than any other identity protection service on the market.

For more information about Identity Guard’s Breach Readiness, visit: www.identityguardbusiness.com/breach-services/data-breach-readiness

 

About Intersections & IDENTITY GUARD®:

Intersections Inc. (Nasdaq: INTX) provides innovative software and data monitoring solutions that help consumers manage financial and personal risks associated with the proliferation of their personal data in the virtual and financial world. Under its IDENTITY GUARD® brand, the company delivers a premium service that utilizes technology solutions, including artificial intelligence to help individuals and organizations take control over their valuable information. Headquartered in Chantilly, Virginia, the company was founded in 1996. To learn more, visit www.intersections.comwww.identityguard.com  and www.identityguardbusiness.com

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
High Stress Levels Impacting CISOs Physically, Mentally
Jai Vijayan, Freelance writer,  2/14/2019
Valentine's Emails Laced with Gandcrab Ransomware
Kelly Sheridan, Staff Editor, Dark Reading,  2/14/2019
Making the Case for a Cybersecurity Moon Shot
Adam Shostack, Consultant, Entrepreneur, Technologist, Game Designer,  2/19/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
5 Emerging Cyber Threats to Watch for in 2019
Online attackers are constantly developing new, innovative ways to break into the enterprise. This Dark Reading Tech Digest gives an in-depth look at five emerging attack trends and exploits your security team should look out for, along with helpful recommendations on how you can prevent your organization from falling victim.
Flash Poll
How Enterprises Are Attacking the Cybersecurity Problem
How Enterprises Are Attacking the Cybersecurity Problem
Data breach fears and the need to comply with regulations such as GDPR are two major drivers increased spending on security products and technologies. But other factors are contributing to the trend as well. Find out more about how enterprises are attacking the cybersecurity problem by reading our report today.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-8980
PUBLISHED: 2019-02-21
A memory leak in the kernel_read_file function in fs/exec.c in the Linux kernel through 4.20.11 allows attackers to cause a denial of service (memory consumption) by triggering vfs_read failures.
CVE-2019-8979
PUBLISHED: 2019-02-21
Koseven through 3.3.9, and Kohana through 3.3.6, has SQL Injection when the order_by() parameter can be controlled.
CVE-2013-7469
PUBLISHED: 2019-02-21
Seafile through 6.2.11 always uses the same Initialization Vector (IV) with Cipher Block Chaining (CBC) Mode to encrypt private data, making it easier to conduct chosen-plaintext attacks or dictionary attacks.
CVE-2018-20146
PUBLISHED: 2019-02-21
An issue was discovered in Liquidware ProfileUnity before 6.8.0 with Liquidware FlexApp before 6.8.0. A local user could obtain administrator rights, as demonstrated by use of PowerShell.
CVE-2019-5727
PUBLISHED: 2019-02-21
Splunk Web in Splunk Enterprise 6.5.x before 6.5.5, 6.4.x before 6.4.9, 6.3.x before 6.3.12, 6.2.x before 6.2.14, 6.1.x before 6.1.14, and 6.0.x before 6.0.15 and Splunk Light before 6.6.0 has Persistent XSS, aka SPL-138827.