Explore the latest trends, research and best practices with industry experts.
Survey: Small Business Security
To better understand how small businesses are approaching the threat of cyber crime, CSID surveyed 150 small business owners (businesses with 1 to 10 employees) across the United States on their concerns about cyber security and their approach to risk mitigation and response.
ID Secured: Volume 1
CSID’s first-edition ID Secured report offers an inside look at a group that CSID is uniquely positioned to understand – the global population of individuals who are active subscribers of identity theft protection products. The report includes data from a study conducted over a three month period, and provides an in-depth look at this group.
Case Study: Hacking the Hackers
To demonstrate just how effortlessly cyber criminals are targeting and exploiting SMBs, CSID reinforced the need for data breach mitigation by executing an experiment. The idea? Develop a mock business, build its presence online and watch as it becomes a target for real cyber criminals to hack.
Finding a Cure for Medical Identity Theft
Many consumers are unaware of medical identity theft and the harm it can cause – both to their wallet and their health. Yet medical identity theft is the fastest growing segment of identity theft in the United States. Ponemon Research reported that 90 percent of healthcare organizations have exposed their patients’ data or had it stolen in 2012 and 2013, and the industry has seen more than 200 breach incidents in 2014 alone.
Survey: Small Business Security
Many small to medium-sized businesses (SMBs) are not taking measures to protect against security risks, and cyber criminals are starting to take notice. In fact, the number of attacks against SMBs nearly doubled from 18 percent in 2011 to 31 percent in 2013. Why the increased attention on smaller sized businesses? According to CSID’s 2014 SMB survey, 31 percent of small businesses are not taking any active measures to protect against security threats.
Identity Management in a Digital World
Prior to the Internet and the relocation of much of our personal data to the cloud, identity management was a simple matter of shredding papers with sensitive information, not sharing personal data with strangers in day-to-day life and not making a spectacle of oneself at work or in public. Today, identity management is a much more complex topic that includes relying on businesses to guard personal information, relying on those same businesses to not violate privacy by selling that information, and exercising a modicum of common sense when sharing personal information online.
The Low Cost and High Reward of POS Malware
Last year, Target and Neiman Marcus both experienced major breaches due to Point of Sale (POS) malware, bringing this type of security breach under intense scrutiny in 2014. Target’s breach resulted in the loss of more than 40 million card numbers, including expiration dates, CVV codes and PIN numbers. Personal information for more than 70 million customers was also stolen including names, mailing addresses, email addresses and phone numbers.
When Good Technology Goes Bad: Evolution of Mobile Technology
Mobile hardware is evolving at an unbelievable rate. Think about it: the cell phone you are using right now has more computing power than the computers that sent Neil Armstrong into space a few decades ago. And not only has mobile technology been advancing so impressively, but the costs associated with the technology have been decreasing, making it more widely available and adopted.
The Target Breach: An In-Depth Look at What Happened and How to Prepare for a POS System Attack
The security breach at Target has been the subject of intense scrutiny and speculation throughout 2014. From November 27 to December 15, 2013, cyber criminals stole millions of customer records after installing malware on Target’s Point of Sale (POS) system. The underlying cause of this enormous breach – an employee from one of Target’s third-party vendors clicked on a malware-ridden link in a phishing scam.