The Verizon 2012 data breach Report of 2011 showed 855 breach incidents and 174 million compromised records. They stated that 98% stemmed from External Agents and 4 % were internal employees, (58% of those data thefts were tied to activist groups. “Most breaches were avoidable (at least in ...
Read MoreRecently there has been a lot written about Advanced Persistent Threats or APTs. In reviewing many definitions of these threats by industry experts and security organizations, here is a common definition of this newer type of threat that is increasingly making the news: Advanced ...
Read MoreLarger companies consider cyber threat as a serious issue that could hinder their business. They follow and keep up with best practice rules. Smaller companies pay less attention to several important areas, and mid-size ones fall somewhere in between the two. Mid-size companies are inconsist ...
Read MoreH. D. Moore of leading vulnerability scanner company Rapid7 has just determined that as many as 200,000 systems connected to the Internet could be hijacked by hackers exploiting bugs in Symantec's pcAnywhere. Even worse for those in retail, up to 5,000 of those are running point-of-sale software ...
Read MoreCompliance is a continuous journey. Even after painful attention to details, things can go wrong. But, not letting it happen again is key. There is just no room for mistakes or repeats of the mistakes when it comes to data security. It is necessary to make corrections and implement the chan ...
Read More