Protect All Customer Personal Data

All Customer Data Is Valuable to Hackers In November UK based postcard-sending service company Touchnote reported to its customers that its systems had been breached resulting in the theft of some customer data. In reporting the incident, the company pointed out that passwords are not stored as text, and, that only the last four digits of customers’ […]

Lack of Cybersecurity Preparedness

Report Reveals over Half of IT Security Practitioners in US Express Lack Confidence in Their Organization’s Ability to Detect Advanced Cyber Threats A recent study surveying IT security practitioners in the US by the Ponemon Institute, reported half of the respondents did not view their organization as a target while more than half expressed a […]

External and Internal Threat Actors

2015 HIMSS Cybersecurity Survey Prepares Us for Next Year Ever since Healthcare Information Management Systems Society (HIMSS) North America released the results of its 2015 HIMSS Cybersecurity Survey we have been examining the results showing the need for improved network and endpoint security, along with data loss prevention (DLP), as we prepare for 2016. In […]

The CMO and Cybersecurity

A Brand’s Reputation is Likely to be the Most Visibly Damaged Asset in the Aftermath of a Breach In this digital age, the company’s Chief Marketing Officer (CMO) may know more about his or her customers than ever before. However, handling all this information improperly can expose the organization to attacks by cyber criminals interested […]

Cybersecurity Still Lacking

Survey Shows Many Companies Lack Understanding of Their Most Important Data Assets Need to Look at Discovery DLP Citing the results of their third quarter survey of more than 700 executives and IT professionals, business consulting and internal audit firm Protiviti noted that despite the increased public awareness of cybersecurity, a third of the firms […]

Chip Card Arrives in U.S.

Does Not Address Fraudulent Internet and Telephone Payment Transactions October 2015 marks an important date in the U.S. adoption of the EMV standard, so named by its original creators, Europay, MasterCard and Visa. Major card brands will begin to shift liability for fraudulent EMV card-present transactions in the U.S. to favor merchants using EMV-enabled devices. The new technology […]

Malicious Outsider Attacks and Accidental Data Loss

The Most Common Forms of Data Breaches in 2015 According to the latest Breach Level Index, 888 reported data breaches occurred worldwide during the first half of 2015, up 10 percent from the first half of last year. The report, authored by digital security provider Gemalto, shows that malicious outsider attacks, targeting identity theft type […]

FTC Regulating Cyber Security

Reasonable Steps Must be taken to Secure Sensitive Data Companies that do not have security policies and protections in place–putting consumer and employee data at risk–may soon be scrambling. Last month the Third U.S. Circuit Court of Appeals in Philadelphia ruled that the U.S. Federal Trade Commission (FTC) has the authority to take action on […]

Corporate Insider Information Breached

Hackers Pocket Millions from Illicit Trades using Confidential Data Authorities in the United States are preparing to charge an international ring of computer hackers over allegations of securities fraud involving stolen corporate financial information. Unlike the recent high-profile hacks in healthcare and financial services industries the hacks in this case targeted not just people’s identities, […]

Significant Growth in Cloud Security Market

Demand for Cloud Services Grows Amid Cyber Crime Threats With the continued threat of cyber crimes together with an increasing demand for cloud services analysts expect continued significant growth in the cloud security market. A recent report from Transparency Market Research forecasts the cloud security market alone to rise from an estimated $4.5 billion in […]