Microsoft 365 offers tiers of security features, but their email security capabilities may not be as robust as their popularity. Your organization sends thousands of emails every day, and email can be one of the most vulnerable methods for attacks. Phishing, malware, ransomware, stolen credentials, and more can all be...
What really makes a “strong” password? And why are you and your end-users continually tortured by them? How do hackers crack your passwords with ease? And what can/should you do to improve your organization’s authentication methods?
Password complexity, length, and rotation requirements are the bane of IT...
Application fraud has spiked - particularly bogus new accounts - and organizations are scrambling to improve fraud detection mechanisms without negatively affecting the legitimate customer's experience. Robin Love of Early Warning shares insights on how to better predict new account risk.
Most businesses say that preventing fraud is their top concern—the highest point that figure has ever been. The worry is understandable given that fraud increased by 70% in 2021 to more than $5.8 billion.
There is a growing expectation to secure themselves that businesses recognize as well as to protect consumers...
Synthetic Identities, also known as SIDs are then used by cybercriminals to defraud various types of organizations. Fraudsters use these identities to apply for credit accounts, and the identity is then reported to credit reporting agencies, creating a new record associated with the fraudulent information.
In...
Since the pandemic began, 55% of consumers have higher expectations for their digital experience. It’s clear that the digital experience is paramount.
Users — from individual consumers to various small businesses — expect the ability to interact with just about every service online these days. Failure to...
Security firm Group-IB has identified 34 hacking groups that are now selling a stealer-as-a-service model to spread infostealer malware and steal credentials from online gaming and payment accounts. The company advises organizations to be on the lookout for Raccoon and Redline infostealers.
Mega-breaches and ransomware attacks are every day news. Yet, far too many enterprises operate as if just back-ups and cyber insurance will see them through. Mark Sangster of Adlumin weighs in on detection, response and how to demonstrate duty of defense.
Successful account takeovers are one of the most common ways that organizations end up with attackers in their systems. But strong authentication can thwart even the most clever phishing campaigns, says Brett Winterford, regional chief security officer for APJ at Okta.
Banks are getting better at catching a wide range of scams targeted at customer accounts, but they are still struggling with stopping authorized payment fraud through peer-to-peer payment companies such as Zelle, says David Pollino, former divisional CISO with PNC Bank.
On the heels of the recent FTX financial meltdown came the theft of millions of dollars that left thousands of investors, exchanges and others in the lurch. Hugh Brooks of CertiK shares the status of data that FTX stores, the role of regulations and best cybersecurity practices for crypto exchanges.
On the heels of the recent FTX financial meltdown came the theft of millions of dollars that left thousands of investors, exchanges and others in the lurch. Hugh Brooks, director of security operations at CertiK, shares how the funds may have been stolen and what happens next.
The United Kingdom and many other countries are considering ways to make banks liable for authorized payment fraud and lift the burden from millions of victims of online scams. Trace Fooshee, strategic adviser at Aite-Novarica Group, shares his views on why this might not be such a great idea.
In the latest weekly update, ISMG editors share how amateur tactics employed by ransomware gangs are leading fewer victims to pay ransoms, why traditional identity controls can't protect against the growing authorized payment scams, and highlights from ISMG's Crypto and Payments Summit.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.com, you agree to our use of cookies.