Post filled under : Research
Post filled under : Research

Top 4 Insights from Verizon Data Breach Report 2017

verizon-dbir-2017-threat-actions

One of the best reports in the industry, the Verizon DBIR is jam packed with insights on network security and data breaches.

See the top three attacks that cause data breaches. Also check out the one thing used by 80% of successful hackers, and find out what attackers want most.

Continue reading

Filled under : Malware , Research , Top threats
Author : Calyptix
Comment Number : No Comment Yet
Tagged on : malware , research , top threats

DNC Hacks: How Spear Phishing Emails Were Used

Network Security Threats 1

Cyberattacks big and small often start with the same thing: phishing emails. That’s how the breach started at the DNC, and that’s how one is likely to start at your small business.

See how spear phishing emails breached a major U.S. political party, and see how the party’s mistakes can help improve network security at your company. You’ll also see the FBI’s latest report describing the hacks.

Continue reading

Filled under : Research , Top threats
Author : Calyptix
Comment Number : No Comment Yet

Phishing Attacks: 30% will open a scam email

computer-security-incident-oops

Verizon released its 2016 Data Breach Investigations Report, and along with it some astonishing facts about the prevalence and success of phishing attacks.

See why you shouldn’t be deceived by the simple nature of phishing emails and how they can worm their way into your company’s data.

Continue reading

Filled under : Research , Top threats
Author : Calyptix
Comment Number : No Comment Yet

Top 5 Sources of Security Incidents in Retail

computer-security-incident-oops

Russian cyber gangs, Chinese state actors, the hacker group Anonymous – who is the main source of security incidents? The answer might surprise you.

See the top five actors behind security incidents in the retail and consumer industries. You’ll get stats and analysis with a description of each source.

Continue reading

Filled under : pci dss , Research
Author : Calyptix
Comment Number : No Comment Yet
Tagged on : PCI DSS , research , retail

Top 5 Risks of Cloud Computing

Everything-is-fine-office-cloud-fire

There is no denying it: cloud services are popular. But even if you feel that they are the best fit for your company, you should know that they do not come without risk.

See the top five risks of cloud computing, and see how sending your tasks to the sky might impact your data security, availability, and compliance.

Continue reading

Filled under : Research
Author : Calyptix
Comment Number : No Comment Yet
Tagged on : research

Internet Crime and Scams from FBI Annual Report

internet crime

Romance scams, business email fraud, and scams targeting the elderly, were all popular last year, according to the annual report of the FBI Internet Crime Compliant Center.

In this post, we highlight four trends shown in the FBI’s data. You’ll see that social media scams increased 400%, and who is most at risk for romance scams and business email compromises.

Continue reading

Filled under : Research
Author : Calyptix
Comment Number : No Comment Yet

5 New PCI DSS Rules as ‘Best Practices’ Change

PCI DSS Compliance

Everything was great. You were in compliance with PCI DSS. You were the belle of the ball. Everyone was in awe of your team. Then it was midnight -- and your compliance vanished.

Or did it? When the clock strikes 12:00 on June 30, PCI will have five new rules as its ‘best practice guidelines’ become requirements. Will you still be in compliance?

In this post, you’ll see the five new rules so you can have them covered.

Continue reading

Filled under : pci dss , Research
Author : Calyptix
Comment Number : No Comment Yet
Tagged on : PCI DSS
12
Page 1 From 2