Home Cyber Security

Cyber Security

unsecured laptop at home

Preparing for Return-to-Work Cyber-Security Risks

Are corporate networks ready to ensure their systems are protected from the risk of a cyber attack owing to staff and their equipment working from home?
Cyber Security Summit

The Official Cyber Security Summits Are Going Virtual for 2020

Ranked in the “Top 50” information security events globally, Cyber Security Summit has moved its entire calendar of events to a virtual trade show platform.

5 Steps to Prepare Your Cyberattack Communications and Response Plan

The COVID-19 pandemic has opened new opportunities for hackers to infiltrate businesses and expose sensitive corporate data. Download this whitepaper today.

Five Data Breaches that Put Victims at Greater Risk of COVID-19 Scams

Breach Clarity released analysis of recent data breaches that identifies risk for COVID-19 scams.

4 Biggest Cyber Security Vulnerabilities Happening Now from Working at Home

Breaches of corporate and government data appear to be running at levels even higher than experts had feared going into stay-at-home orders due to...

Unprepared Companies Sending Workers Home Face ‘Nightmare’ Data Risks

Even companies that send employees home with proper safeguards face challenges, but those relying on uncontrolled employee-owned phones, computers, and internet to get work done “are sitting ducks” when it comes to data security.

Another Phish in the Sea: This Time It’s Wawa Hit by Hackers

More than 850 Wawa convenience stores and gas pumps had malware in payment processors that potentially compromised customers’ credit and debit card numbers, expiration dates, and cardholder names. What can companies do to prevent phishing attacks?

Cyber Security vs. Physical Security: What Do CEOs Care About?

CEOs and corporate boards of directors are recognizing that a greater amount of dynamic risk attaches to cyber security-related matters than to physical security issues. However, survey results do not indicate a diminishing role for physical security. Instead, respondents tended to report a unified security plan.

Loss Prevention Starts with Protecting Data: 3 Ways to Prevent Insider Threats

It’s evident that there is a new battleground for loss prevention. The product exists as bits and bytes, and it won’t be carried out of stores or looted from warehouses. Indeed, the threat is data theft.

New Year, New Scams: Fraudsters Are Updating and Changing Their Approach

Fraudsters have traditionally approached victims with kindness by friendly and likable scammers to establish trust and sympathy to con money out of unsuspecting individuals. But this methodology is giving way to approaches based on fear and intimidation.

Stay Updated

Get critical infromation for loss prevention professionals, security and retail management delivered right to your inbox.

Download This Special LPM Issue

Now that stores are reopening, what will be different ... and what do you need to do at your company?

 

Top retail experts talk about holiday adjustments, risk mitigation, tracking / notification and much more.

LPM Special Report – "How Retail Is Forging Ahead Transformed by Pandemic"