Identity theft is on the rise and the latest data breach from Equifax could bring an “avalanche” of cyber crime with losses of billions of dollars. These are times when the individual response of each one of us could urge our government to stop the growing crisis, and to change flawed credit application processes that lie at the core of it. The five steps described in this article are useful to those affected and whose privacy might be breached. A personal story highlights that identity theft is more common than people expect.
As of writing this article on Thursday, September 7th, 2017, yet another corporate mega-breach has been revealed and this time it's the credit-reporting agency, Equifax. Negligence, terrible communications, bad crisis management … someone's head is gonna roll.
Verizon has released its 10th annual Data Breach Investigations Report (DBIR), a comprehensive and multi-faceted look-back on breach trends, threat actor tactics and apparent motivations, based on analysis by the company or one of its 65 partners of 1,935 breach events occurring in 2016. This Experts Corner article examines some of its findings by some of the industry's top experts.
Mr. Shrobe recently published an article stating that formal education is the only way out of our cybersecurity hellhole. In response, Keirsten Brager wrote some alternative viewpoints from the perspective of a practitioner and a student of the discipline.
Despite an increasing number of organizations are choosing to embrace the bring your own device (BYOD) trend, there are still considerable security risks involved that many are not aware of. This article will explain what are the possible security risks involved with BYOD and how to prevent them.
It’s 2017 and we can no longer afford to ignore good cybersecurity practices. In this ITSPmagazine exclusive, we connected with top cybersecurity experts to get their recommendations on protecting business and users from malicious attacks.
Since 76% of data breaches are from stolen login information. Jack Bicer, CEO of Sekur Me, says that eliminating passwords and using instant, automatic 2-factor authentication will eliminate fraudulent activities.
Many SMB employees out there put themselves – and their sensitive data – in harm’s way because they are unaware of the risks and the proper security measures to take. In fact, in many data breach cases, human error is often the culprit.
It's time to stop pretending this is not going to happen to you. At work, or in your everyday life, we need to learn how to live with cybersecurity. If we want to play in an IoT and Internet-connected world, we need to learn how to play by the rules. Nobody has taught you thus far. It's time to get started. Now.
It’s unlikely that data breaches and IP theft will ever be eradicated. Human nature will always be a vulnerability and hackers will always find a new way in.
With hacking rampant, and the holiday shopping season upon us, no company wants to become the next headline. Lucas Long from InfoTrust shares 3 ways to keep customer data safe.