Hacktivists have begun deploying much more organized, sophisticated attacks. These are much less likely to be forgotten by customers, as they are aimed at breaching a company’s security and stealing the data most likely to damage the reputation and credibility of the enterprise or, even worse, air customers’ dirty laundry.
Losing proprietary business data through the theft of laptops or other devices can be priceless, but when users are working in the office, IT may be lulled into a false sense of security that devices are safe on the premises.
Who are the Most Influential People in Security? Find out which security leaders are making a difference in the September issue of Security magazine! Also, read about how New York is shaking up cybersecurity, changes in drone legislation, three steps to prepare for the GDPR, school surveillance savings and more.