According to the 2018 Cost of Data Breach study, the retail industry ranked fifth in frequency of data breaches. Since the dawn of the digital age, we’ve fought cyber pirates with tools like firewalls, encryption, strong passwords, antivirus software and white-hat hackers. Read More
Tag: data loss
There must be unwavering support by the leaders at the highest level of the organization in order for an information security policy to weave itself into the day-to-day operations of the business. This will only happen if the policy reflects core business objectives. Read More
Just as online marketplaces made shoplifting worse by providing thieves with an easy avenue to sell their stolen goods, the dark web is raising risk by offering employees a venue for doing the dirty business of selling stolen information. According to a new report, the number of employees who did Read More
By Dave DiSilva
It’s important to understand how criminals gain access to systems in order to better manage your organization’s network data loss prevention. While the playbook for network penetrations varies from attacker to attacker, there are some consistent patterns that emerge from each enterprise-level incident. Network penetrations can be broken down into Read More
While it’s true that retail data security responsibility often does not fall in loss prevention’s court, LP professionals need to be aware of the ongoing risks and emerging concerns in data vulnerability and protection.
The technology firm Gartner, Inc. has studied five key areas of data security concerns that businesses face Read More
According to industry surveys as well as industry buzz, it’s one of the hottest technologies in the retail loss prevention industry, with users swearing by it and companies spending hundreds of thousands of dollars to implement it. What is all the excitement about? Online POS exception reporting systems.
“Exception reporting” is Read More
By Dave DiSilva
Assuming that basic technical blocking-and-tackling issues are addressed,like not having SQL injection exploitable databases, limiting brute force attempts, and using robust egress traffic monitoring/data loss prevention infrastructure,the most vulnerable components of any corporate network are humans. Most breaches start with an employee electing to open the door for an attacker Read More