IN.gov, the official website of the state of Indiana, and Indiana Attorney General Greg Zoeller launched an Identity theft Prevention Toolkit in an effort to aid Hoosiers in protecting themselves against identity theft through education, detection practices, and corrective procedures.
Mobile technology security threats, social media, "hactivism" and more will be at an all-time high in 2012, according to an annual security forecast by the Cyber Security and Information Assurance Division of Kroll Inc.
Booz Allen Hamilton has cited increased cyber threats to senior executives, the impact of organized crime and mobile device security as among the Top 10 Financial Services Cyber Security Trends that will make 2012 a pivotal year for banks and investment firms.
The process of notifying affected populations in the event of a data breach is complex and littered with potential land mines – handled poorly, the notification can be a black eye for an organization and potentially open them up to regulatory fines or sanctions. Brian Lapidus and his team at Kroll have assembled the following advice for businesses to help them minimize their risk and simplify what has become a very challenging process.
The increasingly sophisticated systems running a car may lead to new vulnerabilities, according to a study from security software provider McAfee in partnership with mobile software provider Wind River and embedded security provider Escrypt. Those systems could allow hackers to take control of the car, track its location, and even access devices that are connected to it, including smartphones and tablets carrying valuable personal data.
The number of tablet owners continues to soar, making it difficult for manufacturers to keep up with demand. New tablet owners are increasingly business users, particularly within industries such as retail, banking, and healthcare. Estimates indicate that 25 percent of tablet sales in 2011 will be made by enterprises, leading some to call 2011 the year of the enterprise tablet. All estimations aside, a tablet’s ability to provide mobility and flexibility is irrefutable, and businesses are noticing. But can tablets be deployed in an enterprise without sacrificing security?