While American shoppers say they are very concerned about the safety of their personal information following the massive security breach at Target, many aren’t taking steps to ensure their data is secure. Just 37 percent of surveyed consumers have tried to use cash for purchases rather than pay with plastic, and only 41 percent have checked their credit reports. Even fewer have changed their online passwords at retailers’ websites, requested new credit or debit card numbers, or signed up for a credit monitoring service.
BYOD has brought sweeping changes to the enterprise over the last several years. Nowhere is this more apparent than sitting at the head of IT Security in the role of CISO. Having served in this role at companies like Disney, TiVo and Salesforce during this pivotal time, I can say that it’s an interesting seat to have.
IT security risks continue to become more challenging, not just because of the new technologies of systems and applications, but also because of the size and stature of criminal organizations involved in malicious cyber activity.
Discussions of mobile security typically revolve around the vulnerability of smartphones, tablets and the data they contain to loss and theft. Yet CIOs, CISOs and IT directors need to be equally concerned about the challenges of maintaining data security during everyday use of both corporate-issued and BYOD devices.
Bipartisan legislation to fortify U.S. cybersecurity has been approved by the House Homeland Security Subcommittee on Cybersecurity, Infrastructure Protection and Security Technologies, and the measure – the National Cybersecurity and Critical Infrastructure Protection Act of 2013 – will heat to the full Homeland Security Committee for consideration.
The theft of information linked to 80 million South Korean credit cards, including salaries, monthly card usage, credit rating and card numbers, has sparked widespread public concern, as cardholders rush to bank branches and overload call centers and service websites to see if their information as stolen.
The health sector, in partnership with the federal government, will conduct simulated attacks against health care networksto test their vulnerability to hackers.