Posts

Showing posts from July 22, 2019

Daily Deal - APE OUT, 30% Off

Image
Today's Deal: Save 30% on APE OUT !* Look for the deals each day on the front page of Steam. Or follow us on twitter or Facebook for instant notifications wherever you are! *Offer ends July 29 at 10AM Pacific Time via Steam RSS News Feed "https://ift.tt/2YaSog6"

Daily Deal - Megaquarium, 40% Off

Image
Today's Deal: Save 40% on Megaquarium !* Look for the deals each day on the front page of Steam. Or follow us on twitter or Facebook for instant notifications wherever you are! *Offer ends July 30 at 10AM Pacific Time via Steam RSS News Feed "https://ift.tt/2YnOeWk"

What Call Center Fraud Can Teach Us about Insider Threats

Image
Call centers are often the weakest link in otherwise robust corporate security networks, because of the human dimension. They are staffed by people who make mistakes and are prey to scams and blackmail. Call centers are also vulnerable to malicious employees with an ax to grind or those willing to commit fraud for monetary gain.   According to the Pindrop 2017 Call Center Report , voice fraud rates climbed at more than 350% since 2013 across several industries, including banking.   Most Identity Data is Stolen   Consider this fictional example of call center fraud. A caller contacts a U.S. bank and informs the customer service representative (CSR) that he/she wants to do an electronic funds transfer to pay their child's college tuition bill for a school in France.  The caller says he/she needs

Best Practices for Remote Workers’ Endpoint Security

Image
Remote workers often use corporate devices and computers when working at home or from a local office. When travelling, they might use personal mobile phones or computers to carry out their official tasks. Regardless of the endpoint used to access corporate data, one of an IT admin's most important jobs is to secure that data while it's stored on and accessed by corporate and personal endpoints. Below, we'll look at best practices for getting that job done as well as one company embracing them. Encrypt devices - When users travel, your organization's confidential data goes with them. Wherever confidential data is stored, it must be protected against unauthorized access particularly if a device was lost or stolen. Practice the principle of least privilege - Only grant necessary and sufficient perm

Eight Steps to Migrate Your SIEM

Image
In a large enterprise, the ingestion of security logs, IT system logs and other data sources can easily reach a range of hundreds of thousands to millions of events each day and lead to storing terabytes of logs daily. It's impossible for humans to manually keep up with this deluge of data, so they turn to security information and event management (SIEM) tools to do the work more efficiently. With the relentless wave of cyberattacks and data breaches, however, the performance of legacy SIEMs is under scrutiny due to their inability to scale to detect the huge number of threats facing organizations today, and their limitations when it comes to helping security teams investigate and respond to incidents efficiently. In response to this, many enterprises are re-evaluating their SIEM and migrating to new technology.

Eight Steps to Migrate Your SIEM

Image
In a large enterprise, the ingestion of security logs, IT system logs and other data sources can easily reach a range of hundreds of thousands to millions of events each day and lead to storing terabytes of logs daily. It’s impossible for humans to manually keep up with this deluge of data, so they turn to security information and event management (SIEM) tools to do the work more efficiently. With the relentless wave of cyberattacks and data breaches, however, the performance of legacy SIEMs is under scrutiny due to their inability to scale to detect the huge number of threats facing organizations today, and their limitations when it comes to helping security teams investigate and respond to incidents efficiently. In response to this, many enterprises are re-evaluating their SIEM and migrating to new technology. While this is exciting, migrating a SIEM is no trivial task. Why migrate from a legacy SIEM? The surge in cyberattacks, shortage of qualified security analysts, sheer volu

What Call Center Fraud Can Teach Us about Insider Threats

Image
Call centers are often the weakest link in otherwise robust corporate security networks, because of the human dimension. They are staffed by people who make mistakes and are prey to scams and blackmail. Call centers are also vulnerable to malicious employees with an ax to grind or those willing to commit fraud for monetary gain.   According to the Pindrop 2017 Call Center Report , voice fraud rates climbed at more than 350% since 2013 across several industries, including banking.   Most Identity Data is Stolen   Consider this fictional example of call center fraud. A caller contacts a U.S. bank and informs the customer service representative (CSR) that he/she wants to do an electronic funds transfer to pay their child’s college tuition bill for a school in France.  The caller says he/she needs to send the money urgently, explaining they tried unsuccessfully a number of times to perform the transaction online, and need help. The CSR asks the caller a battery of security questions

Best Practices for Remote Workers’ Endpoint Security

Image
Remote workers often use corporate devices and computers when working at home or from a local office. When travelling, they might use personal mobile phones or computers to carry out their official tasks. Regardless of the endpoint used to access corporate data, one of an IT admin’s most important jobs is to secure that data while it’s stored on and accessed by corporate and personal endpoints. Below, we’ll look at best practices for getting that job done as well as one company embracing them. Encrypt devices - When users travel, your organization’s confidential data goes with them. Wherever confidential data is stored, it must be protected against unauthorized access particularly if a device was lost or stolen. Practice the principle of least privilege - Only grant necessary and sufficient permissions that users need to carry out their activities, for a limited time. Restricting users to the minimum rights required by their tasks will greatly reduce the attack surface of the rem