2020 Cybersecurity Trends to Watch

Mobile becomes a prime phishing attack vector, hackers will increasingly employ machine learning in attacks and cloud will increasingly be seen as fertile ground for compromise. Continue reading 2020 Cybersecurity Trends to Watch

What Is an Insider Threat? Definition, Examples & Statistics to Consider

Here’s what to know about insider threats — what they are, why they occur, and the damage they cause — and how to protect your organization $8.76 million. That’s the…
The post What Is an Insider Threat? Definition, Examples &… Continue reading What Is an Insider Threat? Definition, Examples & Statistics to Consider

What Are Insider Threats and How Can You Mitigate Them?

There are several types of insider threats that organizations should be aware of and each presents different symptoms for security teams to diagnose.

The post What Are Insider Threats and How Can You Mitigate Them? appeared first on Security Intelligence.

Continue reading What Are Insider Threats and How Can You Mitigate Them?

Automate Password Policy & NIST Password Guidelines

Enable automated password policy enforcement with daily password auditing and customizable remediation. With compromised password detection, custom password dictionary, fuzzy matching with common character substitutions, and continuous ongoing monitori… Continue reading Automate Password Policy & NIST Password Guidelines

How to Start Building an Insider Threat Program

Sometimes it only takes one moment, one life-changing incident, to turn the most trustworthy employee into an insider threat.

The post How to Start Building an Insider Threat Program appeared first on Security Intelligence.

Continue reading How to Start Building an Insider Threat Program

Former Trend Micro employee enabled scam calls by stealing customers’ personal data

A former employee of Trend Micro stole the personal data of some customers with a “clear criminal intent” and then sold it to a third party earlier this year, the cybersecurity company disclosed Tuesday. Trend Micro first caught wind of the unauthorized disclosure when several users of a home security product began receiving unannounced phone calls from people impersonating Trend Micro support staff. The company says such contact is always a scam because its support calls are always scheduled in advance. After investigating, Trend Micro uncovered that an employee, who has since been fired, had accessed a company customer support database that contained names, email addresses, support ticket numbers and some telephone numbers. It was not immediately clear when the employee first gained access to the database. Trend Micro said it disabled the unauthorized account and law enforcement has been notified. Less than 120,000 Trend Micro consumer customers are affected, the company said. It did not specify what the scammers tried […]

The post Former Trend Micro employee enabled scam calls by stealing customers’ personal data appeared first on CyberScoop.

Continue reading Former Trend Micro employee enabled scam calls by stealing customers’ personal data

To Mitigate Insider Threats, Time is of The Essence

Insider threats pose myriad challenges to an organization but are often deprioritized in favor of preventing external threats from compromising company assets. It’s a situation further exacerbated by the fact that a good percentage of what actually fa… Continue reading To Mitigate Insider Threats, Time is of The Essence

Why Humans Are a Growing Target for Cyberattacks β€” And What to Do About It

Cybersecurity defenses and cyberattack methods are evolving rapidly, but human beings, not so much. This is why nearly all cyberattacks are now based on exploiting human nature.

The post Why Humans Are a Growing Target for Cyberattacks — And What to Do About It appeared first on Security Intelligence.

Continue reading Why Humans Are a Growing Target for Cyberattacks β€” And What to Do About It

The IT Trifecta: An Overview of National Cyber Security Awareness Month 2019

This year, National Cyber Security Awareness Month focuses on a trifecta of themes: Own IT, Secure IT and Protect IT.

The post The IT Trifecta: An Overview of National Cyber Security Awareness Month 2019 appeared first on Security Intelligence.

Continue reading The IT Trifecta: An Overview of National Cyber Security Awareness Month 2019