Perspectives news, articles & updates| SC Media

Perspectives

Five tips for controlling insider threats during the work-from-home era

The internet was rocked by a very public breach on Twitter during July in which dozens of celebrity accounts were compromised. The hacked accounts announced all at once that they’d double “donations” made to their personal bitcoin account, which in reality was a cryptocurrency scheme. As more details emerged, we learned that the cybercriminals behind…

Maximize zero trust security by expanding beyond basic principles

The pandemic has fundamentally changed how security teams think about protecting the business, in many cases accelerating digital transformation projects and placing renewed emphasis on the Zero Trust model for information security. As security teams implement Zero Trust, it’s important to consider access management and control. In doing so, this reflects a larger shift in…

Maximize zero trust security by expanding beyond basic principles

The pandemic has fundamentally changed how security teams think about protecting the business, in many cases accelerating digital transformation projects and placing renewed emphasis on the Zero Trust model for information security. As security teams implement Zero Trust, it’s important to consider access management and control. In doing so, this reflects a larger shift in…

12 checklist items for defeating Magecart attacks

Magecart groups have made many successful attacks on high-profile companies over the past two years. In a Magecart attack, attackers covertly inject credit card skimming code into the checkout pages of e-commerce websites to exfiltrate data on thousands of customers. While some might only remember Magecart from the 2018 British Airways breach, one of these…

12 checklist items for defeating Magecart attacks

Magecart groups have made many successful attacks on high-profile companies over the past two years. In a Magecart attack, attackers covertly inject credit card skimming code into the checkout pages of e-commerce websites to exfiltrate data on thousands of customers. While some might only remember Magecart from the 2018 British Airways breach, one of these…

How to Prevent Recruiting Scams During the Pandemic

During the ongoing pandemic, we’re not just facing unprecedented health challenges, we’re now forced to deal with those who view this situation as an opportunity to carry out fraud and scams against susceptible people and organizations. These scams often aim to collect personally identifiable information and steal money from the victims. Malicious actors take advantage…

How to Prevent Recruiting Scams During the Pandemic

During the ongoing pandemic, we’re not just facing unprecedented health challenges, we’re now forced to deal with those who view this situation as an opportunity to carry out fraud and scams against susceptible people and organizations. These scams often aim to collect personally identifiable information and steal money from the victims. Malicious actors take advantage…

Collaboration tools make work-from-home easier, but they can cause costly breaches

The COVID-19 crisis has transformed how and where we work. And that has profound implications for data security. When shelter-in-place orders started last March, IT organizations did heroic work expanding their VPN capabilities, distributing secure endpoint devices, and accelerating adoption of collaboration platforms such as Zoom, Microsoft Teams, Google Meet, and Slack. Stanford researchers have…

Combat data breaches by using training and technology

Corporate data breaches are a big deal, and as data grows more valuable and regulations become stricter, it’s increasingly important to have the right mechanisms in place to prevent them. IBM’s 2020 Cost of a Data Breach report found that the average cost of a breach in the U.S. was more than $8 million. Even…

How to effectively combat RDP attacks for secure remote access

The rise of the coronavirus pandemic has prompted organizations around the world to adopt a work-from-home policy. Analysis from security firm Kaspersky found that this sudden shift has resulted in more than 1.5 million new Remote Desktop Protocol (RDP) network attacks globally. The number of attacks targeting open RDP servers in the United States has…

Next post in Perspectives