Technical Problem or Cyber Crime? How to Tell the Difference

As soon as the Oct. 4 Facebook mega outage took place, questions about the cause ran rampant. Was it a cyber crime or a technical glitch?? Who was at fault? The outage reportedly resulted in the loss of some $60 to $100 million dollars of revenue, and Facebook’s stock plunged 4.9% on the same day. […]

The post Technical Problem or Cyber Crime? How to Tell the Difference appeared first on Security Intelligence.

Continue reading Technical Problem or Cyber Crime? How to Tell the Difference

The Cost of a Data Breach Goes Beyond the Bottom Line

How do you measure the cost of a company data breach? You could try asking those that have been attacked. The IBM Security Cost of a Data Breach Report 2021 did just that, and the numbers reveal some hard truths.  For example, ransomware attacks cost an average of $4.62 million. These costs included escalation, notification, […]

The post The Cost of a Data Breach Goes Beyond the Bottom Line appeared first on Security Intelligence.

Continue reading The Cost of a Data Breach Goes Beyond the Bottom Line

Data Breach Pulse Check: On-Prem Database Security

A recent industry study analyzed 27,000 on-prem databases across the globe, with surprising findings. In far too many cases, on-premises database security is weak. The good news is that you can manage the risk to cut down on the chance of a data breach.  Nearly half (46%) of internal data assets in the study had […]

The post Data Breach Pulse Check: On-Prem Database Security appeared first on Security Intelligence.

Continue reading Data Breach Pulse Check: On-Prem Database Security

How to Deal With Unpatched Software Vulnerabilities Right Now

According to the 2021 X-Force Threat Intelligence Index, scanning for and exploiting vulnerabilities was the top infection vector of 2020. Up to one in three data breaches stemmed from unpatched software vulnerabilities. Take a look at this list of vulnerabilities or design flaws with no official Microsoft fix. In any case, one in three might […]

The post How to Deal With Unpatched Software Vulnerabilities Right Now appeared first on Security Intelligence.

Continue reading How to Deal With Unpatched Software Vulnerabilities Right Now

Identity and Access Management: What’s Driving the Rush?

A recent Fortune Business Insights report projects that the global Identity and Access Management (IAM) market (valued at $9.53 billion in 2018) will reach $24.76 billion by the end of 2026, showing a CAGR of 13.17%. What’s behind this massive demand? In a nutshell, people don’t want their identities stolen. But the real drivers are […]

The post Identity and Access Management: What’s Driving the Rush? appeared first on Security Intelligence.

Continue reading Identity and Access Management: What’s Driving the Rush?

What Happens to Information After a Data Breach?

We’ve grown accustomed to it by now — a few million accounts broken into here, another hundred million there. After a company data breach, what happens to all the data? Where does it go? And how does this impact your vulnerability analysis? In June 2020, stolen Facebook user data suddenly popped up for sale on […]

The post What Happens to Information After a Data Breach? appeared first on Security Intelligence.

Continue reading What Happens to Information After a Data Breach?

Cybersecurity Awareness: How Much Data Can An Attacker Get From an Employee ID?

Cyber awareness may seem fairly obvious, but it’s not always. For example, you would never post a photo of your driver’s license on Facebook, right? How about your company ID card? Then there’s that selfie you took at the office. Were you wearing your work badge? Not a good idea. Part of cybersecurity awareness is […]

The post Cybersecurity Awareness: How Much Data Can An Attacker Get From an Employee ID? appeared first on Security Intelligence.

Continue reading Cybersecurity Awareness: How Much Data Can An Attacker Get From an Employee ID?