Security breach recovery has a huge price tag

In a recent Kaspersky Labs report: Damage Control: The Cost of Security Breaches, Kaspersky surveyed more than 5,500 companies in 26 countries to determine the cost of recovery from a security breach. Ninety percent of businesses admitted a security incident and forty percent of businesses surveyed lost sensitive data due to an internal or external security threat. On average, enterprises paid $551,000 dollars….

READ MORE

Advertisements

Nuclear power plants are ripe for hacking due to a ‘culture of denial,’ new study warns

Following the Fukushima nuclear disaster in March 2011, there were calls throughout the industry to tighten safety standards at all atomic power plants around the world. However, according to a new review of the industry, cyber security was apparently not high on the list.

As reported by the UK’s Financial Times, nuclear power plant managers are engaged in a “culture of denial” about the risks of cyber attack, as many have failed to take adequate measures to protect themselves from hacking, the review found.

READ MORE

FBI and DHS Warn of Security Risks from the Internet of Things

The FBI and Department of Homeland Security have issued alerts about, in essence, the modern Internet.

Their public service announcements concern security risks posed by the so-called Internet of Things, or IoT, a situation where everyday objects connect to a network.

Researchers this summer proved that connected items can endanger people driving cars and wearing pacemakers. The Defense Department secretary last week mentioned the inventors of the Internet have been working on security fixes for IoT.

READ MORE

84% Support Eliminating Passwords

LaunchKey, the leading mobile authentication platform, today released findings from a recent survey which found that password-based authentication is no longer capable of meeting the demands of modern information security. According to survey data, an overwhelming 84% of respondents would support eliminating passwords all together.

Additionally, more than three-fourths of those surveyed (76%) feel their data would be more secure with an alternative form of verification, with 59% preferring fingerprint scans over passwords.

READ MORE

You’ve Just Fallen Victim To Identity Theft. Now What?

Blink. Now do it again. That’s how long it takes for identity theft to claim another victim in the U.S. More than 12 million new victims every year, a million every 30 days, one every two seconds.

There are many reasons why identity theft is the biggest single crime epidemic in history. It’s very easy to commit, to make a lot of money, and to get away with. As one notorious thief observed “if I can make $10,000 in a morning without even getting out of bed, why wouldn’t I?”

READ MORE

6 Password Tips to Protect Against Business and Identity Theft

Ah, those pesky passwords. If you work in the corporate world or in an office, you have one for your PC/Network and, unless there is a password synchronization application that combines them, you probably have more than one for other applications. Add those to the ones that you have for your home Internet, your banking and other websites that require passwords, and before you know it you have a nightmare on your hands in trying to manage them. How easy a target are you for business and identity theft?

Part of the frustration has to do with the different requirements for password formatting. Some systems only require four characters, some require eight. Some need a combination of alpha and numeric characters and…

READ MORE

Internet roulette: Is the Internet of Things worth the risk?

Are we ready for the “Internet of Things”? Probably not. The phrase — coined in 1999 by researcher Kevin Ashton while working for Procter & Gamble — refers to things (cars, homes, factories, hospitals) whose performance is monitored and guided by digital networks. We already have one wildly successful example: GPS navigation that directs us to unfamiliar destinations. But countless other possibilities have excited futurists and tech companies.

Be skeptical. It’s not that technological opportunities aren’t genuine. The trouble is that they come with huge risks — risks that tend to be minimized or presumed solvable. The more activities we put on the Internet and other networks, the more vulnerable we become to hacking, cyberwarfare, software glitches and the like.

READ MORE

As the Internet of Things (IoT) connects innumerable everyday devices, previously closed systems are opened up to remote access and control.

Unfortunately, hostile parties lurk everywhere, ready to exploit any vulnerability. To attain full rewards of the digital age, businesses and consumers need to believe the IoT’s benefits exceed their risks.

Our increasingly connected world carries both opportunities and threats. Assess your readiness.

READ MORE

Medical identity theft hits all-time high

The lion’s share of medical identity theft victims can expect to pay upwards of $13,500 to resolve the crime. What’s more, about 50 percent of consumers say they would find another healthcare provider if they were concerned about the security of their medical records. How’s that for a business case to take security a little more seriously?

READ MORE