More data breaches have been reported in Australia than anywhere else in the APAC region so far this year, according to a security index.
data breach - News, Features, and Slideshows
data breach in pictures
Dating website, Ashley Madison, was the target of a data breach as a result of inappropriate security safeguards, according to findings of a joint investigation by the Australian Privacy Commissioner, Timothy Pilgrim, and the Privacy Commissioner of Canada (OPC), Daniel Therrien.
How to prevent people from getting tricked by digital scams
A surprising 90 per cent of all industries experience breaches leading to stolen medical records, proving patient data theft is an issue that stems beyond the health sector, a new report said.
Cyber security insurance is set to become more sophisticated in 2016, forcing enterprises to meet new security requirements to be eligible for coverage, according to a new report.
The typical organization loses 5% of its revenues to fraud by its own employees each year, with most thefts committed by trusted employees in executive management, operations, accounting, sales, customer service or purchasing, according to the Association of Certified Fraud Examiners (ACFE). This type of malicious behavior by "privileged users" who have been given broad access to the company's computer assets has captured the attention of CIOs across the country.
A data breach like the one recently reported by AT&T demonstrates that security policies alone are only a paper tiger without the technological teeth to make sure they are enforced, experts say.
How do you know your employees retain what you teach them in company-required security awareness training? You don't -- unless you regularly test their security savvy and effectively address their mistakes during post-test follow-up sessions.
The recently disclosed data breach at the U.S. government's Office of Personnel Management follows a long history of lax security at the agency, according to the inspector general's office.
It seems like almost every week there is a new security breach in either the government or in private business. The latest had nothing to do with China, instead it appeared to be more of a revenge attack by one baseball team on another.
Follow me, if you will, on a journey back in time to just one year ago. As 2013 turned into 2014, the information security industry was buzzing about the latest spate of breaches. Target had ushered in a new era of retail security breaches, with 40 million card numbers lost to the hackers. Little did we know at the time that this was just the beginning, and small potatoes in comparison to what was to come. One year ago, Neiman Marcus and Michaels had joined Target, and <a href="http://www.computerworld.com/article/2487265/security0/security-manager-s-journal--cyberattacks-just-got-personal.html">I wrote in response to the growing number of breach disclosures</a> that "in fact, I have to wonder which retailers have <em>not</em> suffered breaches. The word on the street is that at least a half-dozen other retailers were compromised in the past few months, without publicity." Sadly, this turned out to be true. I hate being right all the time.
Beyond the compromise of valuable information, loss of revenues and damage to brand reputation, data breaches can pose a threat to the careers of security professionals involved: witness the sudden <a href="http://www.networkworld.com/article/2174919/network-security/target-cio-resigns-following-breach.html">departures of both the CEO and the CIO</a> of Target after last year's compromise of 40 million customers' credit cards.
It's so far been another sorry, sorry year in the technology industry, with big name companies, hot startups and individuals making public mea culpas for their assorted dumb, embarrassing and other regrettable actions.
Whitepapers about data breach
This global study involving 350 companies in 16 industry sectors looks at the impact of data breaches and trends. The results from this annual research give insight and a better understanding of the factors that can minimise the financial consequences of a data breach, as well as the positive impact a business continuity management (BCM) program can have on the financial and reputational consequences of breaches.
- Check your Future Risk
- AISA 2016 | Hear from Bruce Schneier, David Lacey, Rik Ferguson and many more | 18-20th October Register Today
- The Future is Encrypted. Manage It.
- The Future is Encrypted. What's your defense?
- Harnessing the Power of Metadata for Security: FIND OUT MORE
- Start your cloud journey. Register now and learn a wide range of AWS cloud solutions covered in the monthly AWS Webinar Series.
- See Your Traffic for What It Really Is
- How to Use Metadata to Make Data-Driven Decisions - Download NOW!
- Which vendors are winning the fight for Internet of Things supremacy?
- ABS points finger at IBM over Census outage
- Telstra augments field tech team to improve installation times
- Optus Business partners with Palo Alto Networks in cyber-security play
- Committee recommends greater scrutiny of WA Govt IT contracts
- How terahertz radiation could help brands identify consumers in future
- Hackers have a treasure trove of data with the Yahoo breach
- IAB appoints News Digital Networks MD as chair
- IGA marketing leader: Purpose and personalisation are critical to competitive success
- CMO's top 10 martech stories for the week - 22 September