Posts Tagged ' data breach'

We are pleased to present below all posts tagged with ' data breach'. If you still can't find what you are looking for, try using the search box.

Cyber Criminals - More than Just the Geek in the Basement

Usually in movies they are portrayed as a maniacal recluse. Sitting in front of multiple computer screens, with AC/DC blasting and crumpled cups of coffee and Red Bull scattered all over the desk and the floor. Or as a “V for Vendetta”, Guy Fawkes-styled freedom fighters with a score to settle. Cyber Criminals, Hackers, Data Thieves are the designations we have given them. And they come in all shapes, sizes and forms, from all walks of life, male/female, rich and poor. Their motivation is as varied as their backgrounds. Some choose to become hackers because they seek revenge on someone who betrayed them. This category includes employees of businesses; citizens angry against the government; lovers who feel they have been wronged. Other cyber criminals are looking for monetary gain, often holding data “hostage”. Businesses need to pay a “ransom’ to receive a “key” to be able to unlock and access their data. Since the inception of mainframes and shared/networke ...

Popular tags: , , , , , , , , , , , , , ,

#Cyber-Aware- If you had a 70% chance of a car accident, you would purchase auto insurance. If you own a small business, you have a 70% chance of a Cyber-Breach

Saturday was the conclusion of Cyber Awareness Month. To give you a bit of background, President Obama designated October as National Cyber Security Awareness Month, “to engage and educate public and private sector partners through events and initiatives with the goal of raising awareness about cyber-security and increasing the resiliency of the nation in the event of a cyber incident.” The Department of Homeland Security, whose purpose is to secure the nation from threats, is the designated "lead agency" concerning all civilian computer systems and infrastructure. The department's focus is defensive, (providing and dispersing information to prevent data from becoming compromised) and responsive, (distributing threat warnings, reacting to data breaches). The DHS's mission is simply to make you aware of the threat, work to minimize it, and handle the repercussions when a data breach occurs.  And although the DHS and other government and private sector interests are doing a wonderful job o ...

Popular tags: , , , , , , , , , , , , ,

The Internet of Things – Cyber criminals are now exploiting the vulnerabilities of automobiles, commercial airliners and even heart monitors.

When consumers and business think of cyber-security, hacking and breaches, the first thing that generally comes to mind is credit card accounts, bank accounts and health data; any personal information that is stored on large mainframes in extensive databases. But did you know that your automobiles, smart thermostats, bio-chips, heart monitoring implants and other small devices in your everyday life, also have the capability of being hacked? Devices that collect useful data are known as “The Internet of Things”. IoT is a network of physical objects embedded with electronics, software, sensors and connectivity to enable objects to collect and exchange data. These devices collect useful data with the help of various existing technologies and then autonomously flow the data between other devices. Experts predicted that the amount of IOT devices in the marketplace will be 50 billion objects by 2020. On September 10th, the F.B.I issued a Public Service Announcement warning to businesses and cons ...

Popular tags: , , , , , , , , , , , , ,

There are over 300 security/data breaches every single minute...

The NYSE halted trading last week due to a “technical issue”.  Almost every headline and ticker running on CNN, CNBC, or The New York Times immediately blasted the message: “Officials Deny Cyber-Attack.” The Wall Street Journal and United Airlines followed up that day with their own computer issues. It’s become the first “go to” thought in everyone’s mind every time a snafu, a glitch or a complication occurs, Data Breach, Cyber Attack, and Security Compromise.  All data and computer infrastructure has become vulnerable.


Popular tags: , , , , , , , ,