Only 45 percent of consumers have changed an online password or PIN code in the past year after learning of data breaches; 15 percent made fewer online purchases on mobile devices; and 28 percent shopped less frequently at a retailer that had suffered a data breach.
The U.S. Postal Service is the latest victim in a busy year of data breaches. Data from 750,000 employees and retirees, as well as information from 2.9 million postal service customers, has been affected.
Data security used to be relatively simple. Office buildings and areas within them presented clear “perimeters” that companies could protect with locks, alarms, and if necessary, searches of belongings.
Ground chuck and filet mignon are two very different types of beef. Ground chuck is priced for everyday meals. Filet mignon, however, is a luxury cut, prized for its tenderness with a price tag to match. Beef may be what’s for dinner, but what kind clearly matters to the consumer.
Target Corp. appointed Jacqueline Hourigan Rice, a former General Motors executive, to be chief risk and compliance officer and a senior vice president.
In August, Community Health Systems announced that an external group of hackers attacked its computer network that an external group of hackers attacked its computer network and stole non-medical data of 4.5 million patients – the second-largest HIPAA breach ever reported.
Attackers used authorized credentials in more than 76 percent of network intrusions in 2013, allowing them to impersonate legitimate network traffic while conducting suspicious activities.
Building off of technology from Intel Corporation, this system lets organizations proactively control where virtual workloads can run, further mitigating the risks of data mobility that virtualization and cloud computing create.
Eight months: That’s the average amount of time most IT security breaches go unnoticed. Security enterprises need to establish not only ways to protect themselves from these breaches but ways to uncover them in real-time, before they become major business disruptions. And as Bring Your Own Device (BYOD) and mobility continue to transform the way we do business, many security managers and IT executives are finding that if they don’t initiate a robust security policy, employees are likely to use personal laptops and mobile devices to conduct business anyway.