Managing cybersecurity risks while balancing the appropriate prevention will continue to play a major role throughout all sectors. The need to have advanced response plans to a cyber incident come to the forefront in 2019.
Posts about Facebook security, cyber risk trends, and scam artists past and present all made it into the top five for the data protection category.
Data security is a task that only the government and business leaders need to worry about, right? Wrong!
It’s important to consider how a sense of entitlement can motivate wrongdoing, according to experts. For many of today’s workers, experts say, it’s not stealing at all—it’s leaving with what’s theirs.
Sponsored by FortaliceAs this holiday season approaches, are you ready to stand with your IT security counterparts and protect the brand? How many of...
Robocalls reached a record 3.36 billion in April of 2018, according to the voicemail and cell blocking app YouMail. That equates to 1,297 calls placed each second.
There must be unwavering support by the leaders at the highest level of the organization in order for an information security policy to weave itself into the day-to-day operations of the business. This will only happen if the policy reflects core business objectives.
Similar to eBay's process, dark web sellers often solicit and publish customer feedback so perspective buyers can evaluate the criminal's reputation for delivering illegal stolen identity information as described. How's that for honor among thieves?
So what exactly is social engineering? It is the manipulation of people into performing actions or divulging confidential information. It is a confidence (con, for short) trick for information gathering, fraud, or system access.
In an effort to give employees access to corporate resources from anytime and anywhere, an increasing number of retailers are introducing Bring Your Own Device (BYOD) programs.