How to prevent people from getting tricked by digital scams
data breach - News, Features, and Slideshows
data breach in pictures
A surprising 90 per cent of all industries experience breaches leading to stolen medical records, proving patient data theft is an issue that stems beyond the health sector, a new report said.
Cyber security insurance is set to become more sophisticated in 2016, forcing enterprises to meet new security requirements to be eligible for coverage, according to a new report.
Guy Betar examines some of the causes for concern with the growing number and size of data breaches.
The U.S. Securities and Exchange Commission has charged 32 defendants with fraud in an international scheme that used stolen, yet-to-be-published press releases from hacked websites to conduct stock trades.
The typical organization loses 5% of its revenues to fraud by its own employees each year, with most thefts committed by trusted employees in executive management, operations, accounting, sales, customer service or purchasing, according to the Association of Certified Fraud Examiners (ACFE). This type of malicious behavior by "privileged users" who have been given broad access to the company's computer assets has captured the attention of CIOs across the country.
A data breach like the one recently reported by AT&T demonstrates that security policies alone are only a paper tiger without the technological teeth to make sure they are enforced, experts say.
How do you know your employees retain what you teach them in company-required security awareness training? You don't -- unless you regularly test their security savvy and effectively address their mistakes during post-test follow-up sessions.
The recently disclosed data breach at the U.S. government's Office of Personnel Management follows a long history of lax security at the agency, according to the inspector general's office.
It seems like almost every week there is a new security breach in either the government or in private business. The latest had nothing to do with China, instead it appeared to be more of a revenge attack by one baseball team on another.
Follow me, if you will, on a journey back in time to just one year ago. As 2013 turned into 2014, the information security industry was buzzing about the latest spate of breaches. Target had ushered in a new era of retail security breaches, with 40 million card numbers lost to the hackers. Little did we know at the time that this was just the beginning, and small potatoes in comparison to what was to come. One year ago, Neiman Marcus and Michaels had joined Target, and <a href="http://www.computerworld.com/article/2487265/security0/security-manager-s-journal--cyberattacks-just-got-personal.html">I wrote in response to the growing number of breach disclosures</a> that "in fact, I have to wonder which retailers have <em>not</em> suffered breaches. The word on the street is that at least a half-dozen other retailers were compromised in the past few months, without publicity." Sadly, this turned out to be true. I hate being right all the time.
Beyond the compromise of valuable information, loss of revenues and damage to brand reputation, data breaches can pose a threat to the careers of security professionals involved: witness the sudden <a href="http://www.networkworld.com/article/2174919/network-security/target-cio-resigns-following-breach.html">departures of both the CEO and the CIO</a> of Target after last year's compromise of 40 million customers' credit cards.
It's so far been another sorry, sorry year in the technology industry, with big name companies, hot startups and individuals making public mea culpas for their assorted dumb, embarrassing and other regrettable actions.
Whitepapers about data breach
This global study involving 350 companies in 16 industry sectors looks at the impact of data breaches and trends. The results from this annual research give insight and a better understanding of the factors that can minimise the financial consequences of a data breach, as well as the positive impact a business continuity management (BCM) program can have on the financial and reputational consequences of breaches.
- As networks evolve, visibility remains key to managing IT-security risk in business terms
- The Future is Encrypted. Manage It.
- Start your cloud journey. Register now and learn a wide range of AWS cloud solutions covered in the monthly AWS Webinar Series.
- Ransomware explosion is the latest security wakeup call for CxOs
- Caution: That SSL Blind Spot is Growing
- AISA 2016 | Hear from Bruce Schneier, David Lacey, Rik Ferguson and many more | 18-20th October Register Today
- New Destination Gigamon Security Resources IS HERE
- Join ME Bank, Deutsche Bank and Proofpoint (USA) speakers for a discussion on banking trojans. Register now
- Next-generation SIEM turns low-level security monitoring for high-level business goals
- Deakin University taps Thomas Duryea for Citrix and AppSense deployment
- UXC Red Rock to leverage NetSuite ecosystem following Oracle merger
- ACCC warns against tax scams as ransomware increases
- Oracle squares up to Cloud rivals with $US9.3 billion NetSuite acquisition
- WA government seeks aid from local integrator on ICT strategy
- Black Hat security conference trims insecure features from its mobile app
- Windows 7 PCs with free OS upgrade are still available, for now
- Microsoft listens and learns, pulls a passing grade for Windows 10's freshman year
- Tech boosts the fan experience at U.S. Bank Stadium
- Meet OPPO, the fastest-growing smartphone brand in the world