ACCESS THE LATEST AUTOMOTIVE INDUSTRY NEWS RIGHT HERE!
Scrambling To Comply With FTC Safeguards?
The new FTC Safeguards Rule requires dealerships to implement and maintain an information security program that protects consumer data. The new Safeguards Rule goes into effect in December 2022. [...]
Valuable vs. Worthless Continuous Threat Monitoring
When it comes to cybersecurity you should first and foremost focus on protecting your business from a cyberattack. Your focus should not be simply to comply with new regulations. [...]
Cyber Threat Hunting – A Proactive Cyber Defense
The key to mitigating - or eliminating - the impact of a cyberattack is to detect the attack in its infancy, swiftly stop it, and then quickly remove all [...]
Penetration Tests Don’t Stop Cyberattacks
Dealers are concerned about complying with the new FTC Safeguards Rule. As they delve into what they need to do to comply there appears to be confusion about the [...]
Mergers, Acquisitions & IT Effectiveness
The high velocity consolidation of the automotive retail space coupled with an explosion in cybercrime makes it increasingly important to be aware of the impact an acquisition can have [...]
Cybersecurity Best Practices, Cyber Liability Insurance, & Compliance
The cyber liability insurance market is in turmoil. Insurers found themselves exposed to a significant increase in the volume and severity of ransomware attacks that they didn’t foresee. As [...]
Key Performance Metrics for Gauging Your Cybersecurity Posture
No one is perfect. No business has the perfect cybersecurity set-up. Everyone has ample room for improvement. Improving your cyber defenses is an ongoing endeavor. It never ends because the [...]
A Dealership’s Best Cyber Defense
There’s a lot that goes into implementing and maintaining an effective cyber defense. But there is one key element that rises to the top from an effectiveness standpoint – [...]
Attract More Cybercriminals – Pay The Ransom
A recent survey performed by Cybereason found that 80% of organizations that fell victim to a ransomware attack and paid the ransom were attacked again. They also report that [...]