Blog Posts Tagged with "Data Loss"

69dafe8b58066478aea48f3d0f384820

ICS-CERT Issues Illinois Water Pump Failure Report

November 24, 2011 Added by:Headlines

ICS-CERT and the FBI found no evidence of a cyber intrusion... In addition, there is no evidence to support claims made in the initial Illinois STIC report... that any credentials were stolen, or that the vendor was involved in any malicious activity that led to a pump failure...

Comments  (0)

37d5f81e2277051bc17116221040d51c

What Are Your Digital Assets Worth?

October 21, 2011 Added by:Robert Siciliano

According to Consumer Reports, malware destroyed 1.3 million personal computers and cost consumers $2.3 billion in the last year. With the increased popularity of tablets, smartphones, and Macs, threats are becoming both more common and more complex for non-PC devices...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Impact: The Biggest Security Breaches of All Time

October 17, 2011 Added by:Headlines

While 2011 may be the year of the breach, the record for overall breach impact is still held by credit card payment processor Heartland Payment Systems with over 130 million accounts affected and costs in the neighborhood of seven billion dollars...

Comments  (1)

69dafe8b58066478aea48f3d0f384820

Citigroup Faces Class-Action Lawsuit for May Breach

October 10, 2011 Added by:Headlines

“Defendants have taken no steps that adequately or effectively protect cardholders against illegal use of the cardholders’ sensitive and extensive financial records since the breach,” the suit states. Officials estimate that $2.7 million was stolen from 3,400 accounts in the attack...

Comments  (0)

37d5f81e2277051bc17116221040d51c

Hackers Targeting Small Businesses

September 16, 2011 Added by:Robert Siciliano

Big companies and big government get big press when their data is breached. When a big company is hit, those whose accounts have been compromised are often notified. With smaller businesses, however, victims are often in the dark, regardless of the state laws requiring notification...

Comments  (0)

39728eff8ac87a48cfb050f0df29ceaa

WikiLeaks: An Insider's Perspective

September 08, 2011 Added by:John Linkous

Many asked why, given that Agencies had the latest incident and event management technologies, the breach had not at least been spotted sooner - even if they were unable to prevent it completely. What followed is a response unlike any I've seen to date in the commercial sector...

Comments  (0)

972cda1e62b72640cb7ac702714a115f

Universities Account for a Higher Number of Breaches

August 29, 2011 Added by:Kurt Aubuchon

Hospitals are 48 times more likely to show up as breach victims than would be predicted if breaches were distributed evenly among all US firms. Colleges and universities turn up in breach reports about 357 times more often than if distributed evenly. That is a staggering number....

Comments  (1)

850c7a8a30fa40cf01a9db756b49155a

That Shady Rat Was Only a Security Peer

August 07, 2011 Added by:J. Oquendo

After reading about the APT called Shady Rat I shrugged my shoulders and said so what. Why are ten year old attacks and tools still a problem? The answer is simple: Many companies and their staff are under-qualified, incompetent, uneducated, all of the above, or just don't care about security...

Comments  (17)

99edc1997453f90eb5ac1430fd9a7c61

Don't Lose Customers Over a Data Breach

July 28, 2011 Added by:Javvad Malik

Your competitors are taking advantage of your weakened state and swooping in on your customers, wooing them with offers too good to resist and promising them a life of security they deserve which you could never provide. Is there anything you can do to stem your losses?

Comments  (1)

69dafe8b58066478aea48f3d0f384820

Data Thefts Surge Despite Increased Budgets

July 28, 2011 Added by:Headlines

"We live in a data-driven society and access to sensitive or proprietary data continues to bleed past organizational walls, making it a challenge for IT security teams to protect corporate data. Organizations must be able to proactively identify and mitigate security threats in real time..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Harvard Researcher Arrested for Hacking MIT Network

July 22, 2011 Added by:Headlines

''Stealing is stealing whether you use a computer command or a crowbar, and whether you take documents, data or dollars. It is equally harmful to the victim whether you sell what you have stolen or give it away," said U.S. Attorney Carmen Ortiz...

Comments  (0)

F29746c6cb299c1755e4087e6126a816

How to Inform Customers of a Data Breach

July 14, 2011 Added by:Kelly Colgan

The news is bad: Your company suffered a data breach. Don’t make it worse by sending out a confusing, overly technical or outright alarming letter to your customers. The goal is to inform, educate and reassure your customers, not bore or scare them...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Morgan Stanley Reports Customer Data Breach

July 06, 2011 Added by:Headlines

"The sensitive information on the password-protected CD-ROMs included names, addresses, Social Security numbers, Morgan Stanley Smith Barney account numbers and income earned on tax exempt bonds or funds you hold or held in 2010..."

Comments  (1)

0a8cae998f9c51e3b3c0ccbaddf521aa

How a Major Data Breach is Like Quicksand

July 01, 2011 Added by:Rafal Los

Put yourself in the shoes of a few of the major organizations that have had high-profile data breaches due to compromised applications or web sites lately... the more they struggle and fight, the worse things appear to get. Why is this? Remember that there are no castle walls...

Comments  (1)

C787d4daae33f0e155e00c614f07b0ee

Thoughts on Trustwave's 2011 Global Security Report

June 22, 2011 Added by:Robb Reck

We bring in these third party vendors because we trust that they have all the experience and knowledge with a given security product. But they are missing a critical piece: Experience with our systems. No technology solution is complete and ideal for every environment out of the box...

Comments  (2)

69dafe8b58066478aea48f3d0f384820

The Citigroup Breach and Tips for Secure Online Banking

June 13, 2011 Added by:Headlines

The Citigroup breach is considered one of the very few successful hacks against a major banks systems, and underscores the need for continued vigilance by financial institutions and their clients where security best practices are concerned...

Comments  (0)

Page « < 3 - 4 - 5 - 6 - 7 > »