As employees travel during the holidays, many will be taking their work along for the journey. The surge in remote work due to the COVID-19 pandemic means that security professionals must remain vigilant this holiday season.
The information technology (IT) and communications sector was the most targeted by cyberattacks in 2021, according to data from Darktrace. This marks a shift from 2020, when the financial and insurance sector underwent the highest cyberattack volume.
Although cybercriminals will always try to adapt to new security measures and insert themselves in the middle of a financial transaction, financial firms can prevent cyberattacks by using fingerprint, facial recognition, and other verification methods that cannot be stolen or faked.
Security talks to Jann Yogman, who has written and produced comedy for Michael J. Fox, Dana Carvey and Conan O'Brien during his career. Yogman brought his comedy skills to Mimecast to help out with cybersecurity awareness training, structuring the program like seasons of a situation comedy, with actual comedic actors playing repeating characters.
Lookout, Inc. released a report showing that mobile phishing exposure surged 161% within the energy industry between the second half of 2020 and the first half of 2021.
Employees and non-employee contractors continue representing the most critical weak link in the IT chain. Too many employees, and vendors using corporate networks, are still falling for phishing attacks. Enhanced worker training on cyber risks helps, but training coupled with stronger systems offers the best protection against cyber threats.
The Identity Theft Resource Center's data breach analysis for the third quarter of 2021 has been released, highlighting an uptick in breaches compared to the first half of the year. The U.S. is set to break its own record for most data breaches in a year in 2021.
A new study from BioCatch, the "2021 Fraud Transformation Survey: Detecting and Preventing Emerging Schemes," asked security leaders at global financial institutions about their perceptions of fraud and risk management.
How long does a cybercriminal’s timeline usually take? What are their moves? And what tools do they usually employ? To answer these questions, it helps to think like a hacker.