Breach Prevention

Avoiding holiday scams

Posted on Dec 06 2011 by

With the flood of online shoppers comes the accompanying tidal wave of fraudsters washing over the cheerful holiday landscape. Hidden behind the online mistletoe, cyber-thieves lurk with seasonal scams, virtual Scrooges with plans to spoil holiday shopping for consumers and retailers.

Share

Data breaches make the hospitality industry less hospitable

Posted on Nov 16 2011 by

According to a new report by British insurance firm Willis Group Holdings, insurance claims for data theft worldwide jumped 56% last year, with the largest share of those attacks – 38% – targeting hotels, reports and tour companies.
Why are hackers increasingly making themselves at home in the hospitality sector?

Share

Honoring veterans by protecting their identities

Posted on Nov 10 2011 by

It is a cruel irony that service members who defend our country by fighting abroad are often most at risk from the threat of identity theft at home. Frequent deployments, relocation and the unique demands of military life create vulnerabilities for fraudsters to exploit, and military personnel can remain unaware that they have been targeted long after a crime has been perpetrated.

Share

Your biggest data breach risk may be on your payroll

Posted on Oct 25 2011 by

Data breaches may conjure images of malicious hackers and global cyber gangs, but often the worst breaches come at the hands of a company’s own employees.

Share

Stealing data through doppelganger domains

Posted on Oct 18 2011 by

A new form of data hacking has been exposed by two researchers who found ways to easily penetrate Fortune 500 companies through mistyped email addresses.

Share

Cyberdefense without coffee breaks

Posted on Oct 11 2011 by

Strong cyberdefense means strong planning to mitigate the risks of a breach and strong support to help your organization fight against hackers. The solution, experts say, is to shift from the goal of perfect security to active monitoring.

Share

Cyber crime gets costlier

Posted on Oct 04 2011 by

The Ponemon Institute’s recently released “Second Annual Cost of Cyber Crime Study” confirms that data breaches have become a more frequent and damaging hazard of business.

Share

Ensuring the security of personal identifiable information

Posted on Sep 27 2011 by

Everywhere you turn these days there’s word of a new data breach. In the course of our lifetime, our “personal identifying information (PII)” is shared with hundreds of companies, governmental agencies, educational facilities, businesses and health care providers. What can a consumer do to protect their sensitive personal information?

Share

Counter competitive intelligence: Combating hackers in 7 steps

Posted on Sep 12 2011 by

After an in-depth analysis on how hackers find their targets, security and risk professionals can learn 7 key ways to strengthen their infrastructure and reduce risk profiles.

Share

How hackers find their targets

Posted on Sep 06 2011 by

The rash of large-scale data breaches in the news this year begs many questions, one of which is this: how do hackers select their victims?

Share