82% of executives experienced a fraud incident in the past year

Fraud, cyber, and security incidents are now the “new normal” for companies across the world, according to the executives surveyed for a new Kroll report. The proportion of executives that reported their companies fell victim to fraud in the past year rose significantly to 82%, from 75% in 2015 and 70% in 2013, highlighting the escalating threat to corporate reputation and regulatory compliance. Cyber incidents were even more commonplace, with 85% of executives surveyed saying … More Continue reading 82% of executives experienced a fraud incident in the past year

IP Theft: How Often Does Your IP Walk Out the Door?

Outgoing employees are motivated by revenge, greed and resentment to abscond with valuable data. A robust exit process is the key to preventing IP theft.

The post IP Theft: How Often Does Your IP Walk Out the Door? appeared first on Security Intelligence.

Continue reading IP Theft: How Often Does Your IP Walk Out the Door?

Protect Your Crown Jewels Against the Insider Threat: Know Your Users, Know Your Data

All access is not created equal. To protect your crown jewels from an insider threat, it’s critical to know your data and, more importantly, your users.

The post Protect Your Crown Jewels Against the Insider Threat: Know Your Users, Know Your Data appeared first on Security Intelligence.

Continue reading Protect Your Crown Jewels Against the Insider Threat: Know Your Users, Know Your Data

Protect Your Crown Jewels Against the Insider Threat: Know Your Users, Know Your Data

All access is not created equal. To protect your crown jewels from an insider threat, it’s critical to know your data and, more importantly, your users.

The post Protect Your Crown Jewels Against the Insider Threat: Know Your Users, Know Your Data appeared first on Security Intelligence.

Continue reading Protect Your Crown Jewels Against the Insider Threat: Know Your Users, Know Your Data

Security and Technology Literacy Go Hand in Hand

‘Twas just the season when millions of unsuspecting consumers unwittingly courted disaster by gorging their digital appetites on gadgets, gizmos, and whiz bangs that delight kids of all ages with their digital magic. Which is the point of this nearly bah-humbug introduction. Because Arthur C. Clarke was right when he formulated his three laws, the […]… Read More

The post Security and Technology Literacy Go Hand in Hand appeared first on The State of Security.

Continue reading Security and Technology Literacy Go Hand in Hand

2017: A New Year’s Security Resolution

IT leaders should make a security resolution to improve basic hygiene, back up data regularly and share threat information to fight cybercrime in 2017.

The post 2017: A New Year’s Security Resolution appeared first on Security Intelligence.

Continue reading 2017: A New Year’s Security Resolution

Insider Threats, Industrial Sabotage and Game Theory, Part 3: Multiplayer Games

Organizations seeking to prevent insider threats should establish red, blue and black teams to produce threat models for multiplayer games.

The post Insider Threats, Industrial Sabotage and Game Theory, Part 3: Multiplayer Games appeared first on Security Intelligence.

Continue reading Insider Threats, Industrial Sabotage and Game Theory, Part 3: Multiplayer Games

12 tips for implementing secure business practices

Optiv Security shared a list of a dozen tips for implementing secure business practices during the 2016 holiday season. Security experts developed these recommendations to help security and IT teams better prepare their companies and employees to address the increase in cyber threats that occur during this time of year. 1. Limit temporary worker privileges Many organizations employ temporary workers during the holidays to address increased demand for their products or services, and backfill employees … More Continue reading 12 tips for implementing secure business practices