Former Expedia IT support worker spied on company executives

A computer support technician formerly employed at Expedia offices in San Francisco pleaded guilty to securities fraud. Jonathan Ly, 28, admitted he used his position in tech support at Expedia to access emails of Expedia executives so that he could trade in Expedia stock and illegally profit from non-public information. Ly faces a separate Securities and Exchange Commission action requiring him to pay back the more than $331,000 in profits he made in the scheme. … More Continue reading Former Expedia IT support worker spied on company executives

Security Starts With People: Three Steps to Build a Strong Insider Threat Protection Program

To protect their organizations from an insider threat, IT managers should take steps to reduce exposure of data and enhance detection capabilities.

The post Security Starts With People: Three Steps to Build a Strong Insider Threat Protection Program appeared first on Security Intelligence.

Continue reading Security Starts With People: Three Steps to Build a Strong Insider Threat Protection Program

Intentional or not, insider threats are real

Despite the perception that hackers are a company’s biggest cybersecurity threat, insiders, including careless or naive employees, are now viewed as an equally important problem, according to a survey by Dimensional Research. Researchers found that 49 percent of IT security professionals surveyed are more concerned about internal threats than external threats. Malware installed unintentionally by employees was the top concern of respondents, ahead of stolen or compromised credentials, snatched data and abuse of admin privileges. … More Continue reading Intentional or not, insider threats are real

Security Starts With People: Know Who They Are, Know What They Do

Technology is great, but security starts with people. The best way to prevent a data breach is to know the people in your organization and what they do.

The post Security Starts With People: Know Who They Are, Know What They Do appeared first on Security Intelligence.

Continue reading Security Starts With People: Know Who They Are, Know What They Do

Security Starts With People: Know Who They Are, Know What They Do

Technology is great, but security starts with people. The best way to prevent a data breach is to know the people in your organization and what they do.

The post Security Starts With People: Know Who They Are, Know What They Do appeared first on Security Intelligence.

Continue reading Security Starts With People: Know Who They Are, Know What They Do

Was your data breach an inside job?

Kaspersky Lab revealed the current state of security threats among businesses and how their perception of threats compares to the reality of cybersecurity incidents experienced over the past year, both in North America and worldwide. A top concern of North American businesses and a leading cause of successful cyberattacks in these organizations are also the most important asset: their employees. The findings are a subset of data from the 2016 Kaspersky Lab Corporate IT Security … More Continue reading Was your data breach an inside job?

The transformative impact of cloud adoption

Despite the average company using 1,427 cloud services to upload an average of 18.5 TB of data to cloud applications each month, less than 9 percent of cloud providers are taking the strict data security and privacy steps recommended for a modern enterprise, according to Skyhigh Networks. Companies specifically struggle with securing employee behavior, accurately detecting threats and enforcing cloud governance. Securing the new systems of record Now that companies trust enterprise cloud service providers … More Continue reading The transformative impact of cloud adoption

Fraudsters accessed Three UK customer database with authorised credentials

Three UK, a telecom and ISP operating in the United Kingdom, has suffered a data breach. According to Three’s status report on the investigation, the attackers were able to access the company’s customer upgrade system by using login credentials of an employee, and their goal was to steal high-end smartphones. “Over the last four weeks Three has seen an increasing level of attempted handset fraud. This has been visible through higher levels of burglaries of … More Continue reading Fraudsters accessed Three UK customer database with authorised credentials

Getting on the Right Track With a Security Immune System

An integrated security immune system can help IT teams cope with the evolving threat landscape that is outpacing traditional solutions.

The post Getting on the Right Track With a Security Immune System appeared first on Security Intelligence.

Continue reading Getting on the Right Track With a Security Immune System