Santa?s Little Helpers? The Surge of Seasonal Workers Brings Additional Risk

Learn how to quickly onboard temporary holiday staff without over entitled access and avoid abandoned accounts upon their departure.
The post Santa?s Little Helpers? The Surge of Seasonal Workers Brings Additional Risk appeared first on Security Boulev… Continue reading Santa?s Little Helpers? The Surge of Seasonal Workers Brings Additional Risk

Immediate Steps Organizations Need to Do Now, Post-NCSAM

In the ever more connected digital world, identity is no longer just who is accessing your application, but what is accessing it. Prediction of more than 42 billion connected entities by 2022 and it?s easy to understand how data is the new currency. No… Continue reading Immediate Steps Organizations Need to Do Now, Post-NCSAM

Ready or Not, Here Comes the Next Big Digital Attack

The recent ATM hack that netted cybercriminals $13.5 million from a bank in India happened just days after the FBI warned it was coming. Consider this the latest reminder about the importance of being ready for attacks before they happen, not after the… Continue reading Ready or Not, Here Comes the Next Big Digital Attack

Secure Payments of the Future

Protecting the safety and integrity of the U.S. payment system is a top priority and the responsibility of all stakeholders in the payments industry. Learn more about how the Secure Payments Task Force is enabling stronger, safer payments and the chal… Continue reading Secure Payments of the Future

If You Collect It ? You Must Protect It

National data privacy day reminds us how important it is to be empowered to take ownership to protect our privacy, control our digital footprints and advocate for the protection of privacy and data.
The post If You Collect It ? You Must Protect It appe… Continue reading If You Collect It ? You Must Protect It

My Summer Defending the Digital Universe

In RSA’s quest to build out a deeper pool of future Defenders of the Digital Universe I had the pleasure of having Meghan O’Connor as a summer intern on my team.   During her exit interview I asked her what she didn’t realize about cybersecurity and fraud prevention prior to her internship and what advice she…

The post My Summer Defending the Digital Universe appeared first on Speaking of Security – The RSA Blog.

Continue reading My Summer Defending the Digital Universe

Where Is My Cybersecurity Rosetta Stone?

This week’s theme for National Cyber Security Awareness Month is “Cyber from the Break Room to the Board Room.” Communication, like anything else worth getting better at, takes practice. Sometimes it takes planning to know what we want to say and how we want to say it. We also need to anticipate who our audience is…

The post Where Is My Cybersecurity Rosetta Stone? appeared first on Speaking of Security – The RSA Blog.

Continue reading Where Is My Cybersecurity Rosetta Stone?

Six Steps For Cybercrime Survival

While recently cleaning my grandfather’s attic, I came across an old Federal Civil Defense Administration brochure titled “Six Steps to Survival – If an enemy attacked today would you know what to do?”  In our modern times, many of us are being attacked on a daily basis by cybercriminals. As such, do you know what…

The post Six Steps For Cybercrime Survival appeared first on Speaking of Security – The RSA Blog.

Continue reading Six Steps For Cybercrime Survival

Hackers Hunt for Healthcare Records

What’s the difference between data theft from a bank account versus a healthcare record? For starters, think of theft from a bank account as the equivalent of a single withdrawal; one and done. Sooner than later it’s discovered, a new account number is issued and, as a hacker, you’re effectively cut off. When it comes…

The post Hackers Hunt for Healthcare Records appeared first on Speaking of Security – The RSA Blog and Podcast.

Continue reading Hackers Hunt for Healthcare Records

Ransomware Rules for Payment: Do Extortionists Have the Advantage?

When an entire health system fell prey to cybercriminals and medical records were locked up by a ransomware attack in early February, there seemed no choice but to pay the sum demanded in order to avoid the impact on patient care: $17,000 in 40 Bitcoin.   And in that single moment, one hospital became the obligatory…

The post Ransomware Rules for Payment: Do Extortionists Have the Advantage? appeared first on Speaking of Security – The RSA Blog and Podcast.

Continue reading Ransomware Rules for Payment: Do Extortionists Have the Advantage?