Blog Posts Tagged with "Data Loss"
November 24, 2011 Added by:Headlines
ICS-CERT and the FBI found no evidence of a cyber intrusion... In addition, there is no evidence to support claims made in the initial Illinois STIC report... that any credentials were stolen, or that the vendor was involved in any malicious activity that led to a pump failure...
October 21, 2011 Added by:Robert Siciliano
According to Consumer Reports, malware destroyed 1.3 million personal computers and cost consumers $2.3 billion in the last year. With the increased popularity of tablets, smartphones, and Macs, threats are becoming both more common and more complex for non-PC devices...
October 17, 2011 Added by:Headlines
While 2011 may be the year of the breach, the record for overall breach impact is still held by credit card payment processor Heartland Payment Systems with over 130 million accounts affected and costs in the neighborhood of seven billion dollars...
October 10, 2011 Added by:Headlines
“Defendants have taken no steps that adequately or effectively protect cardholders against illegal use of the cardholders’ sensitive and extensive financial records since the breach,” the suit states. Officials estimate that $2.7 million was stolen from 3,400 accounts in the attack...
September 16, 2011 Added by:Robert Siciliano
Big companies and big government get big press when their data is breached. When a big company is hit, those whose accounts have been compromised are often notified. With smaller businesses, however, victims are often in the dark, regardless of the state laws requiring notification...
September 08, 2011 Added by:John Linkous
Many asked why, given that Agencies had the latest incident and event management technologies, the breach had not at least been spotted sooner - even if they were unable to prevent it completely. What followed is a response unlike any I've seen to date in the commercial sector...
August 29, 2011 Added by:Kurt Aubuchon
Hospitals are 48 times more likely to show up as breach victims than would be predicted if breaches were distributed evenly among all US firms. Colleges and universities turn up in breach reports about 357 times more often than if distributed evenly. That is a staggering number....
August 07, 2011 Added by:J. Oquendo
After reading about the APT called Shady Rat I shrugged my shoulders and said so what. Why are ten year old attacks and tools still a problem? The answer is simple: Many companies and their staff are under-qualified, incompetent, uneducated, all of the above, or just don't care about security...
July 28, 2011 Added by:Javvad Malik
Your competitors are taking advantage of your weakened state and swooping in on your customers, wooing them with offers too good to resist and promising them a life of security they deserve which you could never provide. Is there anything you can do to stem your losses?
July 28, 2011 Added by:Headlines
"We live in a data-driven society and access to sensitive or proprietary data continues to bleed past organizational walls, making it a challenge for IT security teams to protect corporate data. Organizations must be able to proactively identify and mitigate security threats in real time..."
July 22, 2011 Added by:Headlines
''Stealing is stealing whether you use a computer command or a crowbar, and whether you take documents, data or dollars. It is equally harmful to the victim whether you sell what you have stolen or give it away," said U.S. Attorney Carmen Ortiz...
July 14, 2011 Added by:Kelly Colgan
The news is bad: Your company suffered a data breach. Don’t make it worse by sending out a confusing, overly technical or outright alarming letter to your customers. The goal is to inform, educate and reassure your customers, not bore or scare them...
July 06, 2011 Added by:Headlines
"The sensitive information on the password-protected CD-ROMs included names, addresses, Social Security numbers, Morgan Stanley Smith Barney account numbers and income earned on tax exempt bonds or funds you hold or held in 2010..."
July 01, 2011 Added by:Rafal Los
Put yourself in the shoes of a few of the major organizations that have had high-profile data breaches due to compromised applications or web sites lately... the more they struggle and fight, the worse things appear to get. Why is this? Remember that there are no castle walls...
June 22, 2011 Added by:Robb Reck
We bring in these third party vendors because we trust that they have all the experience and knowledge with a given security product. But they are missing a critical piece: Experience with our systems. No technology solution is complete and ideal for every environment out of the box...
June 13, 2011 Added by:Headlines
The Citigroup breach is considered one of the very few successful hacks against a major banks systems, and underscores the need for continued vigilance by financial institutions and their clients where security best practices are concerned...
Today's Mobile Device Data Protection Must G... Mic Micac on 09-02-2014
Join the Security Intelligence Network on Li... Mic Micac on 09-02-2014
What PCI Requirements Apply to Us: Tacking a... Mic Micac on 09-02-2014