How small businesses approach risk mitigation and response
CSID released the findings of a survey recently conducted for small businesses (under 10 employees) to determine sentiment and concerns from small business owners around cyber …
Consumers willing to share personal info for a reward
Nearly three in four people have security concerns about using beacon technology on their mobile devices. However, despite these concerns, six in ten will still share personal …
Security breaches hit nearly three in four organizations
A troubling 73 percent of organizations have been plagued by at least one security breach or incident in the past year, with about 60 percent of breaches categorized as …
Geopolitical events fuel uptick in region-specific DDoS attacks
An attack research group was the No.1 target of DDoS attacks, and the Middle East region also saw a sharp increase in attacks last quarter, according to Nexusguard. …
Third party risk on the rise, risk mitigation still not a priority
Given today’s cyber security climate, it is no surprise that companies are wary of the risks associated with third party vendors. Unfortunately, these risks are only …
1 in 10 people have posed as someone else online
Our need for ease and convenience is putting our digital identities and security at risk. A new BehavioSec report finds that 37% of us have shared our personal security data …
The challenges of controlling IT complexity
IT teams overwhelmingly feel that today’s IT environments are very complex – and that growing complexity is making it more difficult for them to do their jobs successfully, …
Most users limit personal info on social media due to hacking fears
Only 10 percent of internet-using adults in America used at least one social networking site in 2005. More than a decade later that number has grown exponentially, with 84 …
Cybersecurity insurance: A global perspective
While the majority of global organizations say that it is “vital” their organization is insured against information security breaches, less than half (41%) are …
DDoS aggression and the evolution of IoT risks
Few organizations globally are being spared DDoS attacks, according to a Neustar survey of over 1,000 IT professionals across six continents. With the bombardment fairly …
Cybercriminals increasingly exploiting human nature
Cybercriminals are exploiting human nature as they rely on familiar attack patterns such as phishing, and increase their reliance on ransomware, finds the Verizon 2016 Data …
Presidential primary election apps may expose sensitive data
Did you know that there are over 1,200 Android apps, both official and unofficial, that help voters keep track of the happenings in the US presidential primary? Better yet, …
Featured news
Sponsored
Don't miss
- Ransom recovery costs reach $2.73 million
- What is cybersecurity mesh architecture (CSMA)?
- New SOHO router malware aims for cloud accounts, internal company resources
- Dropbox says attackers accessed customer and MFA info, API keys
- 2024 Data Breach Investigations Report: Most breaches involve a non-malicious human element