Breach Prevention

Five top trends in security threats

Posted on Jan 31 2012 by

Just as technology is continuously evolving, so are the wily ways in which fraudsters circumvent the safeguards for changing technologies. Symantec’s study Internet Security Threat Report offers a review of where cyber thieves are finding new opportunities and, accordingly, where experts believe the thorniest security trouble spots lie.

Share

‘Tis the season for data privacy

Posted on Jan 24 2012 by

As our world becomes ever smaller and more networked, Data Privacy Day provides information to consumers about the ways in which personal information is collected, stored, used and shared. The international privacy promotion also helps businesses understand the laws and regulations to which they’re subjected and offers guidance about how to best shield themselves from risks.

Share

Quick glance: data breach litigation & legislation in 2012

Posted on Jan 10 2012 by

With the recent spate of data breaches and accompanying class action lawsuits, businesses have constant reminders that an ounce of prevention is worth a pound of cure. The best way to protect your business against the high costs of data breaches is to ensure your security practices and fraud resolution plans are strongly built to ward off malicious attacks and the complications that follow.

Share

Resources for managing your enterprise security and privacy risk in the new year

Posted on Jan 03 2012 by

Here’s a look at some of the resources I find useful in testing and training for a data breach.

Share

Data breaches don’t take a holiday at the arcade

Posted on Dec 27 2011 by

A recent data breach discovery serves as a reminder that even when you’re on vacation, cyber criminals never sleep.

Share

Year of the breach: 2011 in review

Posted on Dec 20 2011 by

Several high profile events throughout the year have kept the spotlight on the issue of data exposures, especially those where millions of consumers information was obtained by malicious hackers. Although the information involved, emails and passwords, does not rise to the level of a “personal identifying information” (PII) breach, it is definitely troubling that such a large number of consumers may become targets of phishing and related attacks, which do attempt to get consumers PII.

Share

Holiday travel without data leaks

Posted on Dec 13 2011 by

The average value of a lost laptop is $49,246, a number based on several factors: replacement cost, detection, forensics, data breach, lost intellectual property costs, lost productivity and legal, consulting and regulatory expenses.

Share

Avoiding holiday scams

Posted on Dec 06 2011 by

With the flood of online shoppers comes the accompanying tidal wave of fraudsters washing over the cheerful holiday landscape. Hidden behind the online mistletoe, cyber-thieves lurk with seasonal scams, virtual Scrooges with plans to spoil holiday shopping for consumers and retailers.

Share

Data breaches make the hospitality industry less hospitable

Posted on Nov 16 2011 by

According to a new report by British insurance firm Willis Group Holdings, insurance claims for data theft worldwide jumped 56% last year, with the largest share of those attacks – 38% – targeting hotels, reports and tour companies.
Why are hackers increasingly making themselves at home in the hospitality sector?

Share

Honoring veterans by protecting their identities

Posted on Nov 10 2011 by

It is a cruel irony that service members who defend our country by fighting abroad are often most at risk from the threat of identity theft at home. Frequent deployments, relocation and the unique demands of military life create vulnerabilities for fraudsters to exploit, and military personnel can remain unaware that they have been targeted long after a crime has been perpetrated.

Share