Breach Prevention

World-class scammers vie for Olympic gold

Posted on Aug 07 2012 by

Swimmers may be stealing the spotlight, but it’s scammers who are taking home the gold–in the form of stolen credit card numbers, PINs, consumers’ personal identities. One familiar con trotted out this year (and every Olympics) is ticket fraud, including what Britons call ‘ticket touting’ (scalping) and its more sinister cousin, counterfeiting. Paying for tickets […]

Share

Three data protection strategies to catch a “phish”

Posted on Jul 31 2012 by

Phishing attacks, despite their long history, continue to be one of the greatest threats to data security. More than 200,000 new viruses are discovered every day, according to malware experts, and they’re usually out of circulation by the time they’re detected. So how does an organization protect data from vicious phishing and spear-phishing attacks? Here’s […]

Share

The top 5 cyber security threats to future of mobile banking

Posted on Jul 24 2012 by

As mobile banking grows in popularity, so do the dangers of data breach and identity theft. In fact, these data security dangers are so significant they could threaten the future of the mobile financial services industry. To get a better understanding of the industry’s cyber security woes, a powerful trade group conducted a comprehensive survey […]

Share

Webinar: Data breaches can happen anytime, anywhere

Posted on Jul 19 2012 by

Can you imagine losing backup disks containing information for 300,000 patients? Or having computer back-up tapes stolen? What if someone hacked into your network servers or lost important laptops? These aren’t hypothetical scenarios. They’re real data breach cases that have occurred in recent years. Can this happen to you? You bet. The key is being […]

Share

A mobile test of human threats

Posted on Jul 17 2012 by

Like Blanche Dubois in A Streetcar Named Desire, we’d all like to think that we can depend upon the kindness of strangers.  Unfortunately, Symantec recently reminded us (in case there was any doubt) that strangers are bound to let you down. In its Smartphone Honey Stick Project, Symantec intentionally “lost” 50 smartphones, all programmed with […]

Share

Cyber insurance: the risk-reduction remedy some companies want and need

Posted on Jul 10 2012 by

  Unfettered mayhem, raining down from cyberspace, has birthed the need for new protection few would have envisioned just a few years ago: cyber insurance coverage. As coverage goes, cyber insurance is still a relatively new and emerging option that, despite its newness, is rapidly gaining traction among threat-weary businesses in every sector—healthcare, in particular, […]

Share

Share National Internet Safety Month with every employee

Posted on Jun 12 2012 by

Internet safety isn’t just for the employees who handle your most sensitive data. It’s for each and every one. With June being National Internet Safety Month, it’s the perfect time to brush up on exactly what that means for your employees and business. In a recent study, 78% of organizations had experienced at least one […]

Share

The compliance risks of social media

Posted on May 29 2012 by

Organizations are adopting social media tools within their networks at increasing rates, yet the legal and compliance risks are often not fully understood or addressed.  A recent Forrester report noted that more than half of security decision-makers and influencers at enterprises reported that they were “concerned” or “very concerned” about the inability to meet regulatory […]

Share

ITRC report identifies top three data breach triggers

Posted on May 07 2012 by

For a company, a data breach can seem like it comes out of the blue. Yet, according to analysis by the Identity Theft Resource Center (ITRC), the three primary causes of data breaches have remained the same since 2009: Hacking Data on the move Insider theft ITRC has been releasing an annual Breach Report since 2007. […]

Share

Responding resourcefully to medical data breaches

Posted on Apr 26 2012 by

  It’s safe to say that healthcare data is/are under attack. Breaches of medical records increased 97% from 2010 to 2011 according to HHS data. Statistics like that lend new urgency and importance to gatherings such as the upcoming HCCA 2012 Compliance Institute. Be prepared: Does your organization observe security protocols and have controls in […]

Share