These 5 Types of Insider Threats Could Lead to Costly Data Breaches

Insider threats are not only the most common cause of cybersecurity risk, but also the costliest and hardest to detect.

The post These 5 Types of Insider Threats Could Lead to Costly Data Breaches appeared first on Security Intelligence.

Continue reading These 5 Types of Insider Threats Could Lead to Costly Data Breaches

Email Security Best Practices to Help You Reel In the Threat of Phishing

Phishing is still among the most common causes of a data breach. Companies should invest in managed security services and comprehensive awareness training to improve email security best practices.

The post Email Security Best Practices to Help You Reel In the Threat of Phishing appeared first on Security Intelligence.

Continue reading Email Security Best Practices to Help You Reel In the Threat of Phishing

What Are the Seven Biggest Social Media Scams of 2018?

Social media scams are an ever-evolving way for criminals to abuse the exponentially connected applications that are increasingly saturating users’ everyday lives.

The post What Are the Seven Biggest Social Media Scams of 2018? appeared first on Security Intelligence.

Continue reading What Are the Seven Biggest Social Media Scams of 2018?

7 Ways to Identify Darknet Cybersecurity Risks

Explore seven characteristics of security risk from the dark and hidden web. Learn how organizations can capture the latent value of dark-sourced threat intelligence.

The post 7 Ways to Identify Darknet Cybersecurity Risks appeared first on Security Intelligence.

Continue reading 7 Ways to Identify Darknet Cybersecurity Risks

How a Cyberattack Framework Can Help Reduce Risk at All Levels, Part 3

An attacker who gains access won’t necessarily walk away with an organization’s proprietary data. Here’s how a cyberattack framework can help you subvert an attacker already in a network.

The post How a Cyberattack Framework Can Help Reduce Risk at All Levels, Part 3 appeared first on Security Intelligence.

Continue reading How a Cyberattack Framework Can Help Reduce Risk at All Levels, Part 3

As Seen on TV: Important Lessons for Winning the Fight Against Cybercrime

The Science Channel documentary, “Dark Web: Fighting Cybercrime,” shows why practice runs are essential to help security teams and business leaders keep their cool in the face of a cyberattack.

The post As Seen on TV: Important Lessons for Winning the Fight Against Cybercrime appeared first on Security Intelligence.

Continue reading As Seen on TV: Important Lessons for Winning the Fight Against Cybercrime

Anubis Strikes Again: Mobile Malware Continues to Plague Users in Official App Stores

IBM X-Force reported that mobile malware developers uploaded at least 10 malicious downloader apps to the Google Play Store as the first step in a process that fetches BankBot Anubis.

The post Anubis Strikes Again: Mobile Malware Continues to Plague Users in Official App Stores appeared first on Security Intelligence.

Continue reading Anubis Strikes Again: Mobile Malware Continues to Plague Users in Official App Stores

June’s Cybersecurity Recap: The Evolving Cybersecurity Career Pathway

In June’s security news, IT experts and educators around the world worked to create a new cybersecurity career pathway through initiatives designed to alleviate the industrywide skills shortage.

The post June’s Cybersecurity Recap: The Evolving Cybersecurity Career Pathway appeared first on Security Intelligence.

Continue reading June’s Cybersecurity Recap: The Evolving Cybersecurity Career Pathway

Goal! Spam Campaigns Capitalize on the World Cup Craze

IBM X-Force researchers observed several ongoing spam campaigns tied to the World Cup — many of which used the official branding of tournament sponsors to lure victims.

The post Goal! Spam Campaigns Capitalize on the World Cup Craze appeared first on Security Intelligence.

Continue reading Goal! Spam Campaigns Capitalize on the World Cup Craze

What Is Transparency’s Role in Establishing Digital Trust With Consumers?

Transparency is a critical factor for consumers when establishing digital trust with companies and service providers due to increasing concerns about data privacy.

The post What Is Transparency’s Role in Establishing Digital Trust With Consumers? appeared first on Security Intelligence.

Continue reading What Is Transparency’s Role in Establishing Digital Trust With Consumers?