To Fight Cybercriminals, Follow the Money Trail

Most cybercriminals are after money. To safeguard your network from money-hungry fraudsters, you need to know where your most valuable assets are stored.

The post To Fight Cybercriminals, Follow the Money Trail appeared first on Security Intelligence.

Continue reading To Fight Cybercriminals, Follow the Money Trail

Administrator Credentials: A Security Breach Waiting to Happen

If access is not properly secured, cybercriminals can use weak administrator credentials to take control over corporate networks.

The post Administrator Credentials: A Security Breach Waiting to Happen appeared first on Security Intelligence.

Continue reading Administrator Credentials: A Security Breach Waiting to Happen

Cloud Security Is Not an Either/Or

Cloud security is neither a magic bullet for analysts, nor a particularly vulnerable target for cybercriminals. It all depends on the effort you put in.

The post Cloud Security Is Not an Either/Or appeared first on Security Intelligence.

Continue reading Cloud Security Is Not an Either/Or

The Enemy Within: Identifying Insider Threats in Your Organization

According to recent research, privileged users and administrators represent the biggest insider threats to any organization’s sensitive data.

The post The Enemy Within: Identifying Insider Threats in Your Organization appeared first on Security Intelligence.

Continue reading The Enemy Within: Identifying Insider Threats in Your Organization

Back to Basics: Six Simple Strategies to Strengthen Your Security Posture

These six basic strategies can help organizations stop some threats, minimize others and improve their overall security posture.

The post Back to Basics: Six Simple Strategies to Strengthen Your Security Posture appeared first on Security Intelligence.

Continue reading Back to Basics: Six Simple Strategies to Strengthen Your Security Posture

Avoiding Security Hype, the Hazard From Hollywood

Unfortunately, the Hollywood approach of security hype doesn’t do much to help organizations improve their actual security.

The post Avoiding Security Hype, the Hazard From Hollywood appeared first on Security Intelligence.

Continue reading Avoiding Security Hype, the Hazard From Hollywood

Zombie Cloud Data: What Your Delete Key May Not Delete

Zombie cloud data — information that lingers in the cloud even after a user supposedly deletes it — can open organizations to data theft and noncompliance.

The post Zombie Cloud Data: What Your Delete Key May Not Delete appeared first on Security Intelligence.

Continue reading Zombie Cloud Data: What Your Delete Key May Not Delete

Compliance Does Not Always Cure Health Care Security Woes

Compliance should be viewed as a framework to facilitate security, not a magic wand to make threats and vulnerabilities disappear.

The post Compliance Does Not Always Cure Health Care Security Woes appeared first on Security Intelligence.

Continue reading Compliance Does Not Always Cure Health Care Security Woes

Who Is Responsible for IoT Security?

As the Internet of Things grows and mobile devices become increasingly connected, the security community must define who is responsible for IoT security.

The post Who Is Responsible for IoT Security? appeared first on Security Intelligence.

Continue reading Who Is Responsible for IoT Security?