The world is different than it once was. It used to be that you needed a 30-foot phone cord to take the phone into another room just so you could have a little privacy, and that when you left work, you really left work, since there wasn’t any way to login remotely.
Nowadays, technological advances have made us truly mobile by enabling us to stay connected 24/7/365. While the workplace impact of 24/7 connectivity has meant that employee productivity has been on the rise, along with it comes challenges that couldn’t have been imagined even 15 years ago.
With massive data breaches at organizations such as Target, Dairy Queen, and JPMorgan, businesses are becoming more aware of the threat of hackers and external threats to their data. And while it’s important to protect yourself from such exposures, history has shown that the real enemy lies within our own companies. Don’t believe it?
Read about today's most urgent security risks in the Threat Intelligence highlights from September where we reveal current cyber events that impact both businesses and individuals, including new ransomware that targets corporate environments, critical security patches, and the threat of cyber attacks against the financial sector.
Wire transfer requests top the list of business email compromise (BEC) objectives, according to a study by Barracuda Networks. Additional objectives laid out by the report include duping users into clicking on malicious links, establishing rapport and stealing information, with the end goal of extorting millions of dollars from unsuspecting companies.
This month's Threat Intelligence Report is about a large hotel chain that reports an “unauthorized access” to its customer database since 2014, exposing data of 500 million guests; a vulnerability in a postal service site that left 60 million customers exposed for more than a year; a third-party vendor breach that exposes data of millions of healthcare patients; a new report that profiles notorious MageCart cyber criminals; court documents that reveal first-ever indictment on ransomware charges; and a bundled pack that makes SamSam and other ransomware easier for hackers to obtain and deploy.
As businesses become
more interconnected, the risk of a third-party data breach
at your organization becomes more imminent. It’s no
longer enough to simply secure your organization’s
network systems and data. Your risk management
program needs to look beyond the perimeter of your
organization to properly vet the third-party vendors who
have access to your networks and data. Fortunately, your
organization can take certain steps to minimize exposure,
reduce the likelihood of a third-party breach and mitigate
Login to download the PDF. Don’t have an account? Create an account to access all of the content in our Resource Library.
Will 2019 be the year of the cyber criminal? Read about today's most urgent security risks in the Threat Intelligence highlights from August where we reveal current cyber events that impact both businesses and individuals.
July Threat Intelligence highlights include decryption codes released, contractor charged in Capital One breach, phishing scheme targets American Express members, and more.
June Threat Intelligence highlights include a major ransomware operation that cashes out, a third-party breach that impacts 12 million patients, ramped-up cyber attacks in the U.S., and much more.
May Threat Intelligence highlights include cyber attacks on Microsoft’s SharePoint software, Windows 10, various business applications, online college bookstores, tax accounting software, and even a church.
This issue of Threat Intelligence reveals the latest major cyber threats facing individuals and organizations, including customer payment card data exposing users' personal information, privacy concerns, poor security practices, phishing, live broadcasting disruptions, ransomware attacks on municipalities, card-skimming, and banking Trojans.
Send a Message
Find a Location