Hacktivists have begun deploying much more organized, sophisticated attacks. These are much less likely to be forgotten by customers, as they are aimed at breaching a company’s security and stealing the data most likely to damage the reputation and credibility of the enterprise or, even worse, air customers’ dirty laundry.
Losing proprietary business data through the theft of laptops or other devices can be priceless, but when users are working in the office, IT may be lulled into a false sense of security that devices are safe on the premises.
According to a CardHub survey of 55 major retailers and 1,000 individuals, 42% of retailers have not updated the terminals in any of their stores and 56% of people don’t care if a retailer’s payment terminal is chip-enabled.
Thinking of building your own Global Security Operations Center? Learn from four leading enterprises about how they developed or modified their GSOCs to bring the most value to their enterprises. Also in this issue: how to attract better cybersecurity talent, healthcare data compliance, working with integrators to test security technology, the 2017 ISC West Product Preview and much more!