Impact of cybercrime underestimated as most crimes go unreported|Network...
For a cyber crime to count as a statistic, the crime has to be reported. Has your company ever been the target of a phishing attack and not reported it? Because cybercriminals can launch coordinated...
View ArticleWhy spear phishing attempts on SMBs are often successful | Email security
Every small business owner knows how computers and specifically email have transformed into critical business systems that businesses cannot function without. It is often easy for business owners to...
View ArticleIdentify Theft Is Still the Number One Consumer Complaint
Each year the Federal Trade Commission releases a report based on data from its Consumer Sentinel Network. Sentinel is a massive database of consumer complaints received directly by the FTC, as well as...
View ArticleIntrusion costs are expensive. Why do you ask?
According to the folks over at Identity Theft Research Center (ITRC), US companies, governmental agencies, universities, and other non-profits last year reported almost 450 breaches and over 17 million...
View ArticleMetadata Matters, Part I
True or false: metadata can be used to discover important patterns and behaviors in social networks? This is as true now as it has been since the start of electronic communications: those whom you...
View ArticleMore Companies under Red Flag Rule for ID Theft Protection
In 2004, Congress amended the 1970s-era Fair Credit Report Act (FRCA) to address the growing problem of identity theft. Under these adjustments to the FCRA, the FTC (along with other regulatory...
View ArticleYet Another Reminder that Cybercrime Isn’t Going Away
Posted on June 25, 2013 by Andy Green Last week, PricewaterhouseCoopers released their 2013 US State of Cybercrime Survey. Coming on the heels of Verizon’s 2013 Data Breach Investigations Report,...
View ArticleMore Companies under Red Flag Rule for ID Theft Protection
In 2004, Congress amended the 1970s-era Fair Credit Report Act (FRCA) to address the growing problem of identity theft. Under these adjustments to the FCRA, the FTC (along with other regulatory...
View Article“A digital guardian will protect you online” – IBM
IBM recently published a number of innovations they expect to see in the near future which can be seen here. Among them was the more interesting concept of “smart guardian” that will safeguard you...
View Article2014 VERIZON DBIR: YEAR OF LIVING DANGEROUSLY
One of the sure signs of spring, besides tulips and daffodils, is the release of the 2014 Verizon Data Breach Investigations Report. For those who are excited by survey methodology, this year’s report...
View Article
More Pages to Explore .....