According to the 2017 Identity Fraud Study released by Javelin Strategy & Research, in 2015, there were more than 1.5 million new account fraud victims that accounted for losses of $2.8 billion. This number increased by 40% in 2016, and there is no reason to believe that this trend is stopping anytime soon.
The...
As mobile devices eclipse computers and laptops as the preferred method of going online, fraudsters have followed users, porting their modus operandi - account takeover, social engineering, and malware based remote control attacks - to the mobile arena. Mobile has opened up many new ways for users to communicate and...
This monthly Security Agenda will highlight some of the most recent additions to our course library. This month's edition features Aetna's Jim Routh on the benefits of 'unconventional controls.' Another influencer, Phil Reitinger of the Global Cyber Alliance discusses email and credential security and how DMARC can...
Security is often discussed as one of the most commonly overlooked ways to add value, and ultimately is an exercise in risk management. One cannot simply sell "security," as if it was a boxed product or a SKU to order. Instead, the MSP assumes more risk from their end customers by taking on the responsibility for...
Keeping pace in today's digital world requires a need for speed and flexibility - especially when it comes to backing up business intelligence on behalf of your customers. Speed of restoration is a pressing issue - when awaiting recovery, chances are your customers' systems are not working at full capacity or maybe...
Ransomware is not a new type of threat: it's been around in its current form for over a decade. However, in the last few years, it has risen to prominence as an increasing number of variants were released into the wild - and several high-profile organisations fell victim to them.
While the number of ransomware...
In an era where users are working simultaneously across mobile,
social and cloud applications and platforms, organizations need
to deploy identity and access management solutions that can scale
and adapt quickly. That's where IDaaS comes in. It simplifies
that onboard experience for the employee and gives...
When a privileged account gets hacked, it allows the attacker to impersonate a trusted employee or system and carry out malicious activity without being detected as an intruder. Once attackers compromise a privileged account, they can typically roam at will through an IT environment to steal information and wreak...
Many IT users lack a full understanding of how privileged accounts function, and how they fit as a key component into the anatomy of a typical breach. That makes IT teams and their organizations much more vulnerable to potential monetary and reputational damage from increasing cyber threats.
Download this...
Why is GDPR so fundamental a change to data processing law? Because new requirements, such as data portability and the right to erasure, will challenge the information governance processes of any organization, however mature. Additionally, joint liability between data controllers and their data processors represents a...
GDPR requires impacted companies to protect personal data of EU residents against data breaches. For security teams this means you must put in place measures that stop personal data from leaking out - without slowing down business processes.
Download this whitepaper and learn how to:
Determine which data is...
By applying a risk-based approach to identity assurance, organizations can go beyond a simple yes/no decision or step-up authentication process and add intelligence that provides broader context about the user and the situation in which they are requesting access.
Download this whitepaper and learn:
Why...
Even though most organizations do not have a "blank slate," it doesn't mean they can't rethink their IAM strategy. Acknowledging identity as the new perimeter, enterprises can reimagine how they utilize IAM to reduce unnecessary risk and cost and better enable the business.
Download this whitepaper to learn how...
You can't stop the IT cloud revolution. Not that you'd want to: Cloud deployment offers much needed scalable capacity, business agility and, in many cases, dramatically lower operating costs. But you are on the hook to secure your organization's access. You need a new approach that that works with today's modern...
Today, every organization must do security risk management. But how do you know what threats you are already mitigating, and which ones you are still vulnerable to? How do you determine where to put your resources?
Download this guide to assess your organization's current security risk management state with a...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing omnibus.healthcareinfosecurity.com, you agree to our use of cookies.