Fraudsters’ methods continually evolve to counter new fraud protection measures and with personally identifiable information, they could steal a customer’s identity or create a synthetic identity. Once a fraudster captures this information, if they are able to access a customer account or open an account, it creates a nightmare scenario with significant repercussions for the business and the customer.
Ideally a penetration test should simulate a real world attack; in the real world, the attacker will always have some objective beyond “get into the network.” No matter who the attacker is, they are motivated by something that they are trying to accomplish – and getting into the network is only one step in that process for the attacker.
Embezzlement is not just a problem for large enterprises – businesses with fewer than 150 employees were 10 times more likely to be victimized by fraud than those with 250-500 employees, according to the 2016 Hiscox Embezzlement Study.
Terrorism is changing. The Center for Cyber & Homeland Security at George Washington University is striving to bring science to the art of security decision-making. What can their research into cyberattacks, terrorism and the evolving threat environment do to help your enterprise? Read about this, sports security, security culture and awareness and more in the July issue.