FFIEC Cybersecurity Assessments Begin

Posted by:

The Federal Financial Institutions Examination Council has started its #cybersecurity assessment pilot program, which will examine more than 500 community banking institutions. Plus, the council has launched a Web page dedicated to cybersecurity information.

The pilot program is slated to run through July, says Stephanie Collins, spokesperson for the Office of the Comptroller of the Currency.

The aim of the pilot program is to help smaller banking institutions address potential security gaps. The assessments will be ...

Read More →
0

10 Things You Probably Didn’t Know About Identity Theft

Posted by:

Misunderstanding Abounds

Identity theft has become one of the biggest concerns for Americans. However, it is also one of the most misunderstood subjects among consumers. We are always looking for ways to protect ourselves from fraud. Credit card fraud or identity theft can turn your life upside down, especially if you have to spend time with law enforcement or incur legal charges. Its always best to prevent identity theft instead of trying to fix problems ...

Read More →
0

1/3 Of Cyber Attacks Take Hours To Detect

Posted by:

While Breach Resolution Can Take Weeks Or Longer…

Researchers polled decision makers of information security, strategy, and solution implementations at companies with 500 or more employees. They explored the security challenges commercial organizations face when confronted with security breaches across their networks.

Despite increased resource allocation designed to protect networks, a CSG Invotas and IDG Research survey finds that 82 percent of respondents report no decrease in the number of network security events or breaches last year—and more than a ...

Read More →
0

Winning Support for Data Breach Prevention

Posted by:

 Getting Buy In At The C-Level

With the plethora of data breaches in recent months, especially the high-profile Target incident, the topic of breach prevention may now be on the minds of more CEOs and boards of directors. But getting buy-in for funding still requires educating executives on the risks that could have a material impact on the business and raising awareness of critical data security issues.

“[Breach prevention] has certainly garnered attention with executives,” says ...

Read More →
0

8 Numbers Identity Thieves Want to Steal From You

Posted by:

identity theft

Know What To Protect

If you haven’t had your identity stolen or compromised yet, just wait…… It’s only a matter of time until it happens to you unless you know what you’re protecting.

The Star Wars Cantina of cybercriminals targeting your identity, healthcare, finances and privacy today might seem like a movie you’ve seen so many times you could lip sync the entire thing. Nevertheless, cybercrime and identity-related scams change ...

Read More →
0

eBay Data Breach Response – How Not to Handle a Crisis

Posted by:

It Took 3 Months To Notice The Breach

eBay, which was recently hit by a cyber attack that exposed the personal data of up to 233 million registered accounts, is now being investigated by three states — Connecticut, Florida, and Illinois — in a joint probe into the e-commerce giant’s security practices.

eBay’s response to the crisis, which unfolded over the past week, has been criticized as being more embarrassing than the attack itself. It took eBay three months to notice the ...

Read More →
0

WordPress Cookie Flaw Lets Hackers Hijack Your Account

Posted by:

woodpress cookie flaw

WordPress Users Beware!

Do you own a blog on WordPress.com website? If so, then you should take extra care while signing into your WordPress account when connected to public Wi-Fi, because it can be hacked without your knowledge, even if you have enabled two-factor authentication.

Yan Zhu, a researcher at the Electronic Frontier Foundation (EFF) noticed that the blogs hosted on WordPress are ...

Read More →
0

50% Of Security Professionals Do Not Secure Their Mobile Devices

Posted by:

secure mobile devices
If you’re a security professional you have to ask yourself “Why don’t I have my own devices secured?”  Well, you’re not alone.

New research has found that half of security professionals don’t bother to secure data on portable devices.

The findings, uncovered by an iStorage survey which questioned 500 attendees at Infosec 2014, revealed that 50 per cent of security pros don’t bother with security measures or encryption when it ...

Read More →
0

The History Of Hacking – Timeline Of Hacking Techniques [Infographic]

Posted by:

cyber security - hacker preventionIf you think hackers get a bad rap, think about this……

The word “hacking” has become synonymous with ill doings and the amount of affected people might be the reason for that. The meanings of hacking are many and most are intended to describe the act of engaging in activities (such as programming or other media) ...

Read More →
0

Cybersecurity Threats – Don’t Forget Employees

Posted by:

Internal Threats Can Be Your Biggest Threat

The usual focus of cybersecurity efforts on external threats to an organization and its mission overlooks the central, powerful danger the inside threat.
Corporations dont take their internal security as seriously as they should, explains Alex McGeorge, senior security researcher at Florida-based Immunity, a provider of specialized offensive information technologies.

McGeorge goes on to emphasize the importance of protecting a corporation from internal threats, explaining, The attack surface inside ...

Read More →
0
Page 13 of 17 «...101112131415...»