Fraudsters’ methods continually evolve to counter new fraud protection measures and with personally identifiable information, they could steal a customer’s identity or create a synthetic identity. Once a fraudster captures this information, if they are able to access a customer account or open an account, it creates a nightmare scenario with significant repercussions for the business and the customer.
Ideally a penetration test should simulate a real world attack; in the real world, the attacker will always have some objective beyond “get into the network.” No matter who the attacker is, they are motivated by something that they are trying to accomplish – and getting into the network is only one step in that process for the attacker.
Embezzlement is not just a problem for large enterprises – businesses with fewer than 150 employees were 10 times more likely to be victimized by fraud than those with 250-500 employees, according to the 2016 Hiscox Embezzlement Study.
A student missing after a catastrophic earthquake, a bus carrying students is involved in a fatal accident in an area with no cellphone connectivity, or a terrorist attack closes a major international airport – each of these realistic scenarios can quickly turn an exciting study abroad program into a personal and organizational crisis.
Who are the thought-leaders pushing the security industry forward, in government, cybersecurity, corporate security and education? Learn about this year’s security champions in our annual Most Influential People in Security report. Also in this issue: Data security concerns for healthcare institutions; ruggedized security technology; covert surveillance installations; how to polish up your resume and references; infinity background screening for workplace violence risk mitigation and more.