You searched for breach/ | SC Media

Your search for breach/ returned 26 results

Active Filters

Click on a filter below to refine your search. Remove a filter to broaden your search.

Last 30 days remove

Your search for breach/ returned 26 results

Sort Results:

Relevant Recent
Perspectives

The Twitter hack exposed the need for more effective PAM security

The 2020 Verizon Data Breach Investigations report found that 80 percent of breaches are caused by compromised or weak credentials. This makes privileged access management (PAM) strategies a must have. Not effectively managing and monitoring privileged accounts means the difference between keeping an organization secure and a catastrophic breach – like the one at Twitter,…
Perspectives

How to use psychology to prevent employee mistakes that lead to breaches

We can all admit that 2020 has been a stressful year. But how have these increased levels of stress impacted cybersecurity at businesses across the country?  Recent data from Tessian found that nearly half of employees say they’ve made a mistake at work that has compromised their company’s security. But even more worrisome, 52% of…
Data Breach, Security News

Supply chain weak security link for 92 percent of US companies

The devastating Target breach – the result of an earlier attack on the retail giant’s HVAC vendor – wasn’t an anomaly. New research from BlueVoyant found that 92 percent of U.S. organizations suffered a breach in the past 12 months as a result of weakness in their supply chain. When four other countries (the U.K.,…
Perspectives

What makes the threat actors tick?

While organizations spend enormous amounts of their cybers budget on preparing for a data breach and determining how a breach occurred, there’s an important element they need to take into account – understanding the actual minds and motivations of the attackers. A clear understanding of attacker motivation lets organizations better anticipate, prepare for and build…
Perspectives

Nudging your employees towards better cyber hygiene

It’s no coincidence that cybersecurity terminology borrows heavily from medicine: bugs, immunity, infections, and viruses. And, as we all know, based on the advice of washing our hands for the umpteenth time and singing “Happy Birthday” twice, prevention often works better than a cure. In cybersecurity, as in medicine, achieving good outcomes requires as many people…
WebCast

Making Customer-focused Identity Simple

Connecting outsiders to a corporate network today is more problematic than ever, and it’s more than just employees working from home. Consumer-to-business accounts, such as customers logging in to make a purchase or reviewing their medical charts, or business-to-business portals in order to collaborate and service accounts, are being stressed at a much greater level today. We've all seen the chaos that can occur when companies that manage managing millions of user accounts, such as an entertainment channel, are breached and private data revealed.
WebCast

Small businesses deserve big protection

Small businesses are facing many of the same cybersecurity challenges as these larger businesses: 66% of small businesses experienced a cyberattack in 2019, and 63% experienced a data breach. But securing your business doesn’t have to be complicated. In this webinar, you’ll learn more about small business cybersecurity and why DNS protection makes a difference.