Theft, fraud and losses from other retail “shrink” totaled $61.7 billion in 2019, up from $50.6 billion the year before as industry security executives reported increases in the number of shoplifting, organized retail crime and employee theft incidents, according to the annual National Retail Security Survey released by the National Retail Federation.
Sure, Greek mythology begins with Zeus, Poseidon and Hades divvying up the universe in a game of dice. But they never employed risk management as a methodology to take the future into their own hands. How can security professionals best develop a risk mindset based on probability and rigor rather than intuition and emotion?
“There are only two types of companies: those that have been hacked, and those that will be.” When former FBI Director Robert Mueller spoke those words in 2012, he sounded hyperbolic. Almost a decade later, it seems prophetic.
Threat actors launched a cyberattack against the Texas Office of Court Administration, the IT provider for many Texas courts, and encrypted their computer systems with ransomware, leaving those systems useless. Cognizant, which has a large presence in Dallas-Fort Worth and is one of the world’s largest and most sophisticated providers of information technology services for other companies, was hit with ransomware with losses currently estimated between $50 million and $70 million.
There is a trade-off between technology innovation and security. The adoption of emerging technologies like 5G will fuel the proliferation of Internet of Things (IoT) which are often built with basic security controls, creating a larger attack surface. At the same time, reliance on data means that data breaches can cause greater damage.
Mission 500 and The New Jersey Electronic Life Safety Association (NJELSA), teamed up for the second year in a row during the NJELSA Annual Symposium, held March 11-13 at Harrah’s Atlantic City for a School Backpack Building Event.
Outsourcing has become a vital part of most business strategies. Not only is it a way to save money, but it’s a simple way to take advantage of expertise you might not currently have in house. But outsourcing can also leave companies vulnerable if the third-party doesn’t have proper cybersecurity procedures.
Security awareness training is no longer a “nice-to-have” for organizations. End users have become a critical component of effective security postures. Employees must have a strong understanding of cybersecurity best practices and learn how to detect and defend against targeted attacks. This shift in priority is needed to address an ongoing trend in the larger threat landscape. Cybercriminals have moved away from complicated, time-consuming technical exploits to concentrate on end users, a large and frequently vulnerable attack surface. Small or large, nearly every attack now begins in the same way: by relentlessly targeting people through email, social networks, and/or cloud and mobile applications.
The rapid growth of extremist groups poses many challenges to enterprise security. How has social media and the Internet provided radical groups the means to spread their ideologies and what are the challenges with identifying and countering these groups?