By using a malware attack on the bank’s ATM server, hackers stole customer information and withdrew 805 million rupees in 14,849 transactions in just over two hours on August 11, mostly overseas.
Security breaches have become common place. Daily, we hear cybersecurity breach reports in the media. However, when healthcare institutions are impacted, consumers see this as “more detrimental” than other industry breaches.
When it comes to addressing global fraud and security in the financial sector, it takes a network to defeat a network.
August 8, 2018
With so many government agencies and departments involved in security operations abroad (such as eliminating key targets or searching for specific terrorists), the essential flow of information was so slow and clunky that only three operations could be coordinated each month.
Bob Kolasky, acting assistant secretary for infrastructure protection at the Department of Homeland Security’s National Protection and Programs Directorate, has been named director of the National Risk Management Center (NRMC), reported Meritalk.
While casting blame for your local team’s loss on Sunday may make for great sports talk, asserting blame for your company’s data breach is an uncomfortable exercise of self-effacement. It is a matter that many company leaders are struggling with. According to a recent survey conducted by the Ponemon Institute, 67% of CISOs expect a data breach or cyberattack in 2018.
Phishing emails remain the number one delivery mechanism for ransomware. The ransomware attack on the Lansing Board of Water and Light in Michigan, which forced the utility to shut down its accounting system, email service and phone lines, succeeded because a single employee opened an attachment to a phishing email.
When undertaking a cloud migration, it’s critical to remember that the security protocols that work in the enterprise will not necessarily work in the cloud.
In the simplest terms, the “attack surface” is the sum total of resources exposed to exploit within your enterprise. Defending the attack surface was a lot less complicated when a defined corporate “perimeter” existed, neatly separating a company’s assets from the outside world. But, next-gen technologies (e.g., cloud computing and software-defined networking) have dissolved the perimeter, causing the attack surface to grow exponentially.