Cyber Security

Five Safety Tips To Minimize Risk And Impact Of Identity Fraud

Javelin Strategy & Research released The 2018 Identity Fraud Study which found that despite industry efforts to prevent identity fraud, fraudsters successfully adapted to net 1.3 million more victims in 2017, with the amount stolen rising to $16.8 billion. Javelin believes that consumers who exercise good online security habits can minimize their risk and impact of identity fraud. Here are five recommendations for consumers to follow.

Identity Fraud Hits All Time High With 16.7 Million U.S. Victims in 2017

The 2018 Identity Fraud Study released by Javelin Strategy & Research, revealed that the number of identity fraud victims increased by eight percent (rising to 16.7 million U.S. consumers) in the last year, a record high since Javelin Strategy & Research began tracking identity fraud in 2003. The study found that despite industry efforts to prevent identity fraud, fraudsters successfully adapted to net 1.3 million more victims in 2017, with the amount stolen rising to $16.8 billion.

MOBOTIX Launches “Cactus Concept” In Video Surveillance

MOBOTIX has announced a raised focus on cyber security by implementing the ?MOBOTIX Cactus Concept.? The concept aims to deliver a comprehensive approach to protecting MOBOTIX products against the threat of cyber-attacks along with education and tools to help customers and partners build and maintain secure video surveillance and access control environments. The objective of the Cactus Concept is to implement a multimedia cyber security campaign in order to raise awareness among potential and existing MOBOTIX customers of the importance of data security in network-based video security systems and how organizations can protect themselves through cost-efficient and intelligent solutions.

DeWalt & McAlpine Launch Premier Cybersecurity Advisory Firm

Cyber Investing Summit Keynote Speaker Dave DeWalt and Panelist Eric McAlpine have joined forces to launch Momentum Cyber, a new advisory firm dedicated exclusively to the cybersecurity industry. The firm offers a new and innovative advisory model specifically designed for the cybersecurity industry combining operational excellence, board room, corporate finance, strategy, exit planning, and M&A services throughout the life of a client – Incubation to Exit.

Nine Ways To Avoid Getting Hooked By W-2 Phishing Schemes

Scammers pose via email as a senior company executive and request HR and Finance managers provide them copies of employee tax forms. Once a complete set is obtained, they sell it on the black market. Between $4 to $20 per form can be raked in by selling off the individual pieces of employee identity W-2s contain or using them to file tax returns and taking the refunds. It?s trapped a surprising number of small business managers and the problem?s only escalating.

Arecont Vision Welcomes Allied Telesis To Technology Partner Program

Arecont Vision®, announced that Allied Telesis, Inc. has joined the Arecont Vision Technology Partner Program. Allied Telesis is a leading provider of hardware and software products that build secure, feature-rich, and scalable data exchange solutions. Allied Telesis is universally recognized for innovating the way in which services and applications are delivered and managed, resulting in increased value and lower operating costs. In a world moving toward Smart Cities and the Internet of Things, Allied Telesis pushes networks to the edge to meet new challenges.

PSA Security, ISC Security And SIA To Launch Cyber Secured Forum

PSA Security Network, the world’s largest systems integrator cooperative, ISC Security Events and the Security Industry Association (SIA), the leading trade association for global security solution providers.

Keeping Up With Technology Risk

As consumers, we are technology junkies searching for the next great fix, and companies around the world are racing to deliver the coolest new distraction. Sounds great, right? There?s just one problem: companies are working under relentless pressure and impossibly tight deadlines that are quite literally harmful to us, and lead to greater technology risk. Remember that awesome smartphone with the iris recognition system, the Secure Folder security feature, and the battery that had the unfortunate habit of exploding? What about the time Amazon lost hundreds of millions of dollars over a typo? With this never ending demand for newer, cooler technology, many businesses today find themselves sacrificing security and operation in order to release as quickly as possible.

SecureCircle Now Delivers Ubiquitous Transparent Security To Unstructured Data

SecureCircle has announced the launch of its flagship security product, SecureCircle, which is the first security product designed to meet the challenges of securing and managing unstructured data in a “zero-trust” world. Differing from other data security and access control solutions, SecureCircle automatically detects and transparently protects data no matter the form it takes throughout its lifecycle.

Expert Speaks On Recent ‘Red Disk’ Security Leak

The latest US Department of Defense ?Red Disk? data security leak is yet another indicator of how current cybersecurity thinking is entirely out of sync with the broader changes in IT that have taken place over the last 20 years. The explosion of IT systems, networks, users, clouds, and devices has caused the size of the typical enterprise?s attack surface to expand exponentially. Any user or device can be the weakest link and become the steppingstone to a major data breach.

8 Cyber Insurance Questions Start-Up and Small Business Owners Are Asking

Question and Answer with Michelle Lopilato, the Senior Vice President, Director of Cyber and Technology, Hub International, along with John Farley, Vice President, Cyber Risk, HUB International. Cyber attacks are a reality in today?s age of technology, but that doesn?t mean you have to become a victim when it affects your business. You can stay afloat by arming your start-up/SMB with proactive and reactive cyber security strategies. Tragically, 60 percent of small to midsize companies that suffer a cyber attack are out of business within six months. Don?t make the mistake in assuming that your business is not as susceptible to breaches as large companies. In fact, 55 percent of 600 small and medium sized business (SMB) in a recent survey reported being hacked.

Most Cyber Attacks Are Inside Jobs

According to IBM Security research, 75% of insider cyber attacks involved malicious intent and 25% involved inadvertent actors. It was also found that the top three industries most under attack are healthcare, manufacturing and financial services, due to the large quantity of personal data, intellectual property, and physical inventory available, as well as massive financial assets, respectively.

Cybersecurity Skills Shortage Impacts Security Operations

According to ESG research, 45% of organizations report having a problematic shortage of cybersecurity skills in 2017. Of course, this applies to all areas of cybersecurity but recent ESG research shows that the skills shortage has a direct impact on security analytics and operations. The research also reveals some of the ramifications of these cybersecurity skills shortages.

Cyber Risk Lessons for Boards and Officers

Large enterprises like Equifax, Target, Sony and Home Depot may have grabbed headlines for cyber attacks, but small to mid-size businesses are the most exposed and the easiest prey. That?s because small businesses have fewer resources and may falsely believe that hackers only target large organizations. Last year, small organizations accounted for 85% of data breach claims, and breaches of less than 10,000 records cost on average $4.66 million.

Spohn Security Warns Of Risks With Cloud Computing Still Emerging

More companies are moving towards cloud technologies for lower costs, faster time to market, and increased employee productivity. However, the vulnerability of common cloud servers creates many new security challenges, the full impact of which we are just starting to determine. Spohn Security Solutions offers advice on catching vulnerabilities and proofing your company against cloud attacks.

Expert Breaks Down WPA2 Security Flaw, Explains Solutions

Researchers have discovered a key flaw in the WPA2 Wi-Fi encryption protocol that allows hackers to intercept credit card numbers, passwords, photos and other sensitive information. The new exploit is called KRACK, short for Key Reinstallation Attacks. The research has been kept under wraps for weeks ahead of a coordinated disclosure. The vulnerability affects the core WPA2 protocol itself and is effective against devices running Android, Linux, and OpenBSD, and to a lesser extent macOS and Windows, as well as MediaTek Linksys.

Cyberattacks: 59% Of Survey Respondents Say Laptops Are Most Vulnerable Devices

Following a first survey from December 2016, ReportLinker conducted a new research on cybersecurity to find out if opinions and attitudes towards this threat have shifted since last year. Many Americans don?t feel they personally are at much risk of a cyberattack, they are however a large majority to think cyberattacks are becoming more a threat now.

Corporations Still Unprepared For Emergency Situations

As security and employee safety remain at risk, unpreparedness is still affecting many corporations according to the Trends in Corporate Security survey from Rave Mobile Safety. Rave, provider of critical communication and data platform solutions trusted to save lives, has released the findings of a corporate security survey. Completed anonymously by 150 managers in corporate safety and security, employee safety, physical plant security, IT security and business continuity, respondents identified factors driving corporate safety and security decision making. According to the data, even with growing awareness around risks in the workplace, there is a continued unpreparedness in corporate security.

NTT Security Launches Security Services For Industrial Control Systems

NTT Security Corporation, the specialized security company of NTT Group, has launched ?IT/OT Integrated Security Services.? The new services will be taken to market globally through the NTT Group companies, Dimension Data, NTT Communications, and NTT DATA, forming part of its suite of integrated services to enable successful digital transformation initiatives for its clients.

US Government Bans Agencies From Using Russian Cybersecurity Software Over Spying Fears

The US government has banned federal agencies from using Kaspersky Lab security software, a Russian company, over concerns it may be tied to state-sponsored espionage. Acting Homeland Security Secretary Elaine Duke has issued a directive given at least six federal agencies a timeline to get rid of the software from government networks.