Tag: hackers

Loading...
When it comes to data breach, hackers are not the bigg...

Human errors are the most common threats to exposing a person’s personal information to data breaches according to an analysis of reported data breaches by Rapid7, a security intelligence company. Rapid7 compiled the data breach information for the report based on the number of reported public information data breaches...

Read More When it comes to data breach, hackers are not the biggest threat
Online holiday shopping is also big business for fraud...

According to EMC’s November 2012 fraud report, online holiday shopping is projected to account for 24% of the year’s total  e-commerce sales which is good news for retailers and unfortunately, it can also be good news for online con artists.  If 2012 is anything like 2011, retailers will need to...

Read More Online holiday shopping is also big business for fraudsters
Report gives readers the latest inside(r) scoop...

Today, those who steal data from the outside also usually steal the headlines. Witness recent mega-hacks at some very well-known firms: Electronics corporation: criminals accessed, stole and reused usernames and passwords from nearly 100,000 accounts stored on third-party servers Social media site: encoded passwords for 6.5 million (one out...

Read More Report gives readers the latest inside(r) scoop
A mobile test of human threats...

Like Blanche Dubois in A Streetcar Named Desire, we’d all like to think that we can depend upon the kindness of strangers.  Unfortunately, Symantec recently reminded us (in case there was any doubt) that strangers are bound to let you down. In its Smartphone Honey Stick Project, Symantec intentionally...

Read More A mobile test of human threats
ITRC report identifies top three data breach triggers...

For a company, a data breach can seem like it comes out of the blue. Yet, according to analysis by the Identity Theft Resource Center (ITRC), the three primary causes of data breaches have remained the same since 2009: Hacking Data on the move Insider theft ITRC has been releasing...

Read More ITRC report identifies top three data breach triggers
The data breach reporting landscape – part 1...

Our guest blogger this week is Karen Barney of the Identity Theft Resource Center (ITRC). As an organization specializing in monitoring and tracking data breaches, the ITRC has come across varying degrees of breaches and reasons for notification due to the varying types of compromised information. We would like...

Read More The data breach reporting landscape – part 1
Expanding the scope of security testing...

Continual testing is one of the main tenants of data breach prevention. Your network has to remain secure to ward off attacks. The typical security test, known as a penetration test, provides a point-in-time view of your security, limiting your scope of...

Read More Expanding the scope of security testing
Five top trends in security threats...

Just as technology is continuously evolving, so are the wily ways in which fraudsters circumvent the safeguards for changing technologies. Symantec’s study Internet Security Threat Report offers a review of where cyber thieves are finding new opportunities and, accordingly, where experts believe the thorniest security trouble spots lie....

Read More Five top trends in security threats
Resources for managing your enterprise security and pr...

Here’s a look at some of the resources I find useful in testing and training for a data b...

Read More Resources for managing your enterprise security and privacy risk in the new year
Avoiding holiday scams...

With the flood of online shoppers comes the accompanying tidal wave of fraudsters washing over the cheerful holiday landscape. Hidden behind the online mistletoe, cyber-thieves lurk with seasonal scams, virtual Scrooges with plans to spoil holiday shopping for consumers and...

Read More Avoiding holiday scams
Your biggest data breach risk may be on your payroll...

Data breaches may conjure images of malicious hackers and global cyber gangs, but often the worst breaches come at the hands of a company’s own employees....

Read More Your biggest data breach risk may be on your payroll
Counter competitive intelligence: Combating hackers in...

After an in-depth analysis on how hackers find their targets, security and risk professionals can learn 7 key ways to strengthen their infrastructure and reduce risk...

Read More Counter competitive intelligence: Combating hackers in 7 steps