Topic:

Show All

Feb 11, 2015 11:13:00 AM

Security Tales from the Wrong Side of Teller Row

Picture it: you are at the next technology conference boasting about how you just spent your entire IT budget to buy the best security equipment on the market. You have earned the admiration of your peers. And then comes a call from the IT department. An employee has compromised your system by clicking on a malicious link in a phishing email, thinking it was a legitimate message from the helpdesk.
 
Social engineering is what happens when an individual uses manipulative tactics to have an employee bypass network security in order to access otherwise confidential information. This manipulation can take the form of a spam email, a phone call pretending to be an angry customer, or even someone walking through the front door impersonating a vendor.

Continue reading >

Topics: Data Breach

Jan 28, 2015 10:34:00 AM

Four Ways to Reduce Bank Risk in a Consumer Data Breach

For the average consumer, a data breach most often looks something like this:

  • I use my card to make a purchase

  • Security measures are insufficient to protect my data

  • A hacker steals my records or card information

  • I report the theft to my bank

  • The bank sends a new card

  • I file a dispute with the bank for any charges that aren’t mine but still feel anxiety about using my card

In Q3 2014 alone, a scenario like this impacted 183 Million accounts, according to the Breach Level Index. In 2014, a record 783 big data breaches were tracked by the Identity Theft Resource Center. They hit almost every industry, with healthcare and retail/business leading the list. Big name corporations were affected – most notably, Target, Home Depot, JP Morgan Chase, Community Health Systems, New York, White Hotels and Neiman Marcus.

Continue reading >

Topics: Data Breach