Why Your Business Requires Security

The States and Federal Identity Theft and Privacy Protection Laws now require businesses, agencies and organizations of all sizes to protect all personal information they store, and report to all their customers whenever a breach occurs. The financial ramifications after having a data breach can be very substantial to both present and future business. In some many cases a company never does recover from a breach and is forced to close down. Currently, the average cost on a company is $3.7M per incident.

Archive for May, 2009

May
08

Data Breach Cost Heartland Millions

Posted by: | Comments Comments Off on Data Breach Cost Heartland Millions

Heartland Payment Systems security breach contributed reported Q1 earnings revealing a $2.5 million loss where the data breach accounted for $12.6 million. A large fine levied by MasterCard accounted for most of these costs. CEO Bob Carr said the company’s work to address post-breach fallout was a costly diversion and they are implenting a costly end-to-end encryption system to help prevent future breaches.  Click here to read the entire article from Associated Press.

Comments Comments Off on Data Breach Cost Heartland Millions
May
01

How Thieves Physically Steal Your Data!

Posted by: | Comments Comments Off on How Thieves Physically Steal Your Data!

Basically, the theft of sensitive information from companies can happen in two ways: physical data breaches or online breaches of security. Physical identity theft refers to cases where the identity thief needs to get in close to their targets or to the information they are trying to obtain. These sorts of identity theft efforts include dumpster diving to search for documents which contain information such as account numbers, social security card or credit card numbers, addresses and like. Basically, any information which contains personally identifying information on a customer, vendor or employee is of use to identity thieves. Mail may be stolen or thieves may pose as company representatives over the phone in an effort to extract information from unwary employees.

Here are top fifteen ways in which corporate information is stolen by physical means: Read More→

Categories : Building Security
Comments Comments Off on How Thieves Physically Steal Your Data!
May
01

Swine Flu and Computer Viruses

Posted by: | Comments Comments Off on Swine Flu and Computer Viruses

As the world is in fear of the Swine flu virus writers and spam sources are taking advantage of this opportunity to infect computers as well. 2% of all spam currently is related to Swine Flu, generating internet congestion on email providers. Part of what makes a virus writer successful in delivering attacks and establishing avenues of propagation is feeding on current fears and enticing users to open up emails or web links believing they are legitimate information sources. Successful cyber attacks are as much as a technical feat as well as understanding the psychology of potential victims.

Categories : Uncategorized
Comments Comments Off on Swine Flu and Computer Viruses
FLEXCAP
SiteLock