Home > RSS Feeds > Security
  • These practical suggestions will prepare your organization to respond quickly and effectively to what experts consider nearly inevitable: a data breach.

  • A network access control solution enables Broward College to manage the thousands of students and staff who access the network from their mobile devices.

  • When nearly two-thirds of the public is back to using cash for purchases—even temporarily—something is incredibly wrong with our security systems and processes.

  • By becoming familiar with applicable privacy laws and regulations and by following these best practices, organizations can help avoid costly data breaches.

  • Digital technologies and the Internet have made it possible for hackers, thieves, spies and other cyber-crooks to unleash threats on a wider and broader scale than ever before. The results of the "2014 U.S. State of the Cybercrime Survey,"  a collaborative study by PwC, CSO magazine, the U.S. Secret Service and the CERT Division of the Software Engineering Institute at Carnegie Mellon University, paints an increasingly dismal picture. Incidents are on the rise, monetary losses are trending upward and most IT organizations lack the skills to match increasingly sophisticated cyber-thieves. In fact, the report found that only 38 percent of companies have a methodology to prioritize security investments based on risk and impact to business strategy. At the heart of the problem: "Cyber-criminals evolve their tactics very rapidly, and the repercussions of cyber-crime are overwhelming for any single organization to combat alone," points out David Burg, PwC's Global and U.S. Advisory Cyber-Security Leader. "The increasing sophistication of cyber-criminals and their ability to circumvent security technologies indicate the need for a radically different approach to cyber-security: a balanced approach that, in addition to using effective cyber-security technologies, develops the people, processes and effective partnerships [needed] in order to strategically counter cyber-security threats,” adds Ed Lowery, special agent in charge, Criminal Investigative Division, U.S. Secret Service. More than 500 executives in U.S. businesses, law enforcement services and government agencies responded to the survey. Here's a look at the key findings.

  • The 2014 FIFA World Cup is putting the spotlight on the growing problem of financial fraud, and it's very difficult to prevent fraud with current technology.

  • Allowing employees to use their personal mobile devices to access the corporate network can increase productivity and morale, but it also increases risks.

  • Just because companies are more aware of insider threats than ever doesn't mean they've figured out how to top the associated risks to their networks and sensitive data. A new report, "Privileged User Abuse & The Insider Threat," produced by the Ponemon Institute on behalf of defense and aerospace systems maker Raytheon, suggests that employees with access to privileged data (such as health care records, intellectual property or customer information) are frequently putting that data at risk despite measures taken to offset that risk. "This survey should serve as a wakeup call to every executive with responsibility for protecting company or customer sensitive data," says Raytheon Vice President Jack Harrington. "While the problem is understood, the solutions are not." In assembling the report, Ponemon Institute surveyed 693 "privileged users," including network engineers, database administrators, information security practitioners and cloud custodians. The findings indicate that not only are many organizations not doing enough to protect against insider threats, but the steps they are taking are proving ineffective. "If privileged users want to do bad things," Harrington adds, "their elevated access to the company network makes it easier for them."

  • One era's creepy technology is another era's norm. There's a lot of research to show that an ongoing barrage of anything raises our "creepy threshold" over time.