Explore the latest trends, research and best practices with industry experts.
The Industrialisation of the Cyber Threat
A decade ago, cybercrime was a cottage industry. The expertise required for a cyber-attack restricted the field to a few specialists, whose focus was selected high-value targets. Thanks to new technologies and greater competition, the tools and data that enable cybercrime have become simple, cheap and readily available; and attacks can be quickly customised, mass produced and efficiently deployed. In short, cybercrime has industrialised.
ID Secured: Volume 1
CSID’s first-edition ID Secured report offers an inside look at a group that CSID is uniquely positioned to understand – the global population of individuals who are active subscribers of identity theft protection products. The report includes data from a study conducted over a three month period, and provides an in-depth look at this group.
Case Study: Hacking the Hackers
To demonstrate just how effortlessly cyber criminals are targeting and exploiting SMBs, CSID reinforced the need for data breach mitigation by executing an experiment. The idea? Develop a mock business, build its presence online and watch as it becomes a target for real cyber criminals to hack.
Finding a Cure for Medical Identity Theft
Many consumers are unaware of medical identity theft and the harm it can cause – both to their wallet and their health. Yet medical identity theft is the fastest growing segment of identity theft in the United States. Ponemon Research reported that 90 percent of healthcare organizations have exposed their patients’ data or had it stolen in 2012 and 2013, and the industry has seen more than 200 breach incidents in 2014 alone.
Survey: Small Business Security
Many small to medium-sized businesses (SMBs) are not taking measures to protect against security risks, and cyber criminals are starting to take notice. In fact, the number of attacks against SMBs nearly doubled from 18 percent in 2011 to 31 percent in 2013. Why the increased attention on smaller sized businesses? According to CSID’s 2014 SMB survey, 31 percent of small businesses are not taking any active measures to protect against security threats.
Identity Management in a Digital World
Prior to the Internet and the relocation of much of our personal data to the cloud, identity management was a simple matter of shredding papers with sensitive information, not sharing personal data with strangers in day-to-day life and not making a spectacle of oneself at work or in public. Today, identity management is a much more complex topic that includes relying on businesses to guard personal information, relying on those same businesses to not violate privacy by selling that information, and exercising a modicum of common sense when sharing personal information online.
The Low Cost and High Reward of POS Malware
Last year, Target and Neiman Marcus both experienced major breaches due to Point of Sale (POS) malware, bringing this type of security breach under intense scrutiny in 2014. Target’s breach resulted in the loss of more than 40 million card numbers, including expiration dates, CVV codes and PIN numbers. Personal information for more than 70 million customers was also stolen including names, mailing addresses, email addresses and phone numbers.
When Good Technology Goes Bad: Evolution of Mobile Technology
Mobile hardware is evolving at an unbelievable rate. Think about it: the cell phone you are using right now has more computing power than the computers that sent Neil Armstrong into space a few decades ago. And not only has mobile technology been advancing so impressively, but the costs associated with the technology have been decreasing, making it more widely available and adopted.
The Target Breach: An In-Depth Look at What Happened and How to Prepare for a POS System Attack
The security breach at Target has been the subject of intense scrutiny and speculation throughout 2014. From November 27 to December 15, 2013, cyber criminals stole millions of customer records after installing malware on Target’s Point of Sale (POS) system. The underlying cause of this enormous breach – an employee from one of Target’s third-party vendors clicked on a malware-ridden link in a phishing scam.
Managing Online Reputation in a Digital World
Consumers are sharing more information online than ever before, with 27% of time online spent on forums and social networks. In an effort to engage with friends and family and enjoy the benefits of social media, people are also exposing themselves in ways that could lead to unwanted consequences, like reputation damage, identity theft and unemployment. But, there are are solutions and common sense practices one can adopt to help manage his or her online reputation.
Risk Mitigation for Small Businesses: A Study of Small Businesses’ Concern and Response to the Cyber Security Risks They Face
When it comes to small business cyber security, it is a different world today than in years past when a company only had to worry about protecting their desktop computers and locally stored files. Small businesses often practice unique operation trends like BYOD and cloud storage, and are responsible for a lot of PII but less prepared to manage it securely. The result — cyber security for small businesses has become incredibly complex causing small businesses to be increasingly targeted for cyber attacks.
Your Data Is Showing: What’s Next in Identity Protection
When it comes to stealing identities, criminals will follow the money. Ten years ago, this meant stealing credit and debit card information to make unauthorized purchases and using stolen Social Security numbers to create new identities and open lines of credit. Today, the information that is valuable to an identity thief is shifting to seemingly harmless details like email addresses and passwords, mothers’ maiden names and dates of birth, even high school mascots and pet names.
Child Identity Theft: A Parenting Blind Spot
April 2, 2013
One in 10 children will become victim to child identity theft and the thieves can go unnoticed for years as children’s credit reports may not be checked until they turn 18. Many times families discover the crime when the child applies for his or her first credit card, loan or apartment and are met with the shocking reality that their credit has been fraudulently used.
Mitigating the Risk of Poor Password Practices
September 28, 2012
When it comes to securing passwords, companies can encrypt, hash, and salt to their hearts’ content — but they will still be at risk. Why? Because people can be careless when it comes to password creation and management. If one consumer uses the same password on multiple sites, and one of those sites is compromised, the others are compromised too.