Skip to content

CyberSecurity Institute

Security News Curated from across the world

Menu
Menu

Author: admini

Endpoint Device Control, Don’t believe the Hype

Posted on June 26, 2006December 30, 2021 by admini

For most companies it is either the theft of proprietary or confidential/classified information or the injection of malicious code or surveillance software into the corporate network. If this is the case then memory devices attached via the USB port is not your only worry.

Take the problem of installing malicious code into a network, and please note that malicious code can be as small as a few Kb. Device Protection solutions are not able to identify malicious code inside the network or prevent it from being introduced into the network other than by a single method alone.

If it is preventing classified information from leaving the company that you are trying to achieve then controlling the use of the USB drive and other I/O devices is only going to give you a partial answer. In cases like these where device protection vendors claim to stop confidential information leaking to unauthorized parties, they are merely marketing their solutions to you and avoiding the real world scenarios.

To put ones faith in a single security solution that gives full granular control of any type of attachable memory device is flawed.

http://www.it-observer.com/articles/1168/endpoint_device_control_dont_believe_hype/

Read more

Security in the balance

Posted on June 25, 2006December 30, 2021 by admini

“There is a growing concern about the damage to brand reputation and brand equity when a phishing attack is successful and gets media attention,” says Justin Doo, managing director of Trend Micro Middle East and North Africa. “One of the biggest risks banks face here is negative customer perception of the banking operations,” agrees Maria Medvedeva, regional director for security management business unit, CA EMEA Eastern markets. “In Dubai, we have read about different banks that have been subjected to fraud, such as phishing e-mails or physical damage to their ATMs. People see it as lack of security control and this causes absolutely negative perception and customer dissatisfaction.”

For a customer, a security fraud means that the bank has failed to implement systems or some type of security control to protect its customers. Such concerns have led to the slow uptake of online banking, according to Doo. “Most banks are spending more money gearing up for growth in online banking than they are spending gearing up for growth in physical location expansion,” he says. Research has shown that the cost of a transaction where somebody visits a branch and does an over-the-counter transaction is nearly ten times the cost of the same transaction that is carried out online,” Doo continues. “However, there is a global slowdown, at the moment, when it comes to internet banking uptake.

To encourage people to adopt online banking, Ayman Majzoub, general manager of Pointsec Mobile Technologies Middle East and Africa, insists banks should put more emphasis on better security tools. For instance, we go and secure one server or secure one desktop. “Banks in the US are already on stage three and four because they are trying already to improve on alignment of business by introducing more and more reporting mechanisms.” Majzoub believes that the lack of regulatory policies is the main reason why banks in the Middle East are not actively doing more to improve security.

http://www.itp.net/features/details.php?id=4568&category=

Read more

Financial Institutions Face Surge in External Security Attacks

Posted on June 23, 2006December 30, 2021 by admini

“The extent and nature of these security breaches signals a new reality for the global financial services industry,” said Ted DeZabala, a principal in the security services group of Deloitte & Touche LLP. “Executing these types of attacks requires significant resources and coordination, which implies professional hackers and organized crime have entered the domain once ruled by ‘script kiddies’ and one-off hackers. This shift means organizations not only face more sophisticated and hard to track attacks, but are also challenged by increased risk and potential loss. Financial institutions should take these factors into account in their overall security strategy.”

The shift to a more sinister criminal profile of online attackers and the potential risk they represent has not gone unnoticed by the financial sector, and there is evidence that companies have started taking steps to fend off these threats. This year, identity theft and account fraud (58 percent), along with identity management (41 percent), made their way into the top five security initiatives for 2006. The industry has also responded to the recent string of natural disasters around the globe, and disaster recovery and business continuity (49 percent) also placed among the top five security initiatives. In fact, an impressive proportion of organizations (88 percent) confirmed having an enterprise-wide business continuity management program in place.

“Deloitte’s survey shows that financial institutions are attentive to the fast-paced and ever-changing security environment,” said DeZabala. “They are shifting priorities and starting to take necessary measures to mitigate emerging security risks and challenges. While it is only natural to shift focus to the most imminent threats, in order to avoid being blindsided organizations must strive to maintain a balanced, more holistic approach to their security operations and initiatives.”

Interestingly, security awareness and training is one of the initiatives that dropped off the top five list from the previous survey. While virtually all (96 percent) respondents were concerned about employee misconduct involving IT systems, only a third (34 percent) have provided their staff with some form of information security and privacy training over the past year. The most common medium financial institutions use for security training and awareness are web page alerts and emails (63 percent). Other, perhaps more effective methods, such as orientation training (35 percent) and recognition of exemplary behavior (9 percent), ranked lower in utilization.

Additional key findings of the survey:

· Ninety-five percent of participants indicated their information security budget grew over the past year. Logical access control products topped the list of security budget spending (76 percent of respondents).
· Almost three-quarters (72 percent) of financial institutions who experienced a security breach indicated the estimated amount of damage for the organization, including direct and indirect costs, was in the range of US $1 million.
· While the number of respondents with a Chief Information Security Officer (CISO), dropped by 6 percent compared to last year (75 percent vs. 81 percent), the life span of the position continues to grow, with 22 percent having been in the position from six to 10 years, up from 13 percent in 2005.
· Two-thirds (65 percent) of respondents confirmed having a program to manage privacy, down by 3 percent from last year.

http://www.bankinfosecurity.com/articles.php?art_id=154

Read more

CSI/FBI: Small Firms Pay Big For Security

Posted on June 23, 2006December 30, 2021 by admini

Training, in particular, shows the greatest economies of scale: It costs companies of $1 billion or more just $18 per year to train their employees in IT security; that same training costs $318 per year in companies of under $10 million. The data might be something of a vindication for smaller companies, which have come under fire recently for moving too slowly in the deployment of security tools and standards such as the Payment Card Industry’s Data Security Standard.

Some 47 percent of respondents now are allocating less than 3 percent of their total IT budget to security, which compares to 35 percent in last year’s survey, according to the study. By contrast, 34 percent are now allocating more than 5 percent of their budgets to security –up from 27 percent last year.

http://www.darkreading.com/document.asp?doc_id=97818&WT.svl=news1_1

Read more

Decline in cybercrime claims rubbished

Posted on June 23, 2006December 30, 2021 by admini

http://www.viruslist.com/en/news?id=189487870

Read more

Study: Most Technology Companies Have Data Losses

Posted on June 21, 2006December 30, 2021 by admini

Of the firms surveyed, only 4 percent said their employers are doing enough to address the issue, and just 20 percent of respondents said that they feel confident that their companies’ intellectual property is being sufficiently safeguarded.

Some 24 percent of interviewees said that the security tools they have installed are being used effectively.

While phishing schemes continue to pose a major threat to companies’ customer information and brand reputations, only 18 percent of those executives surveyed said that their firms have employed technologies aimed at preventing the attacks.

Deloitte said that 37 percent of the companies it interviewed have provided additional security training to their employees within the last 12 months.

While 74 percent of survey respondents said that they expect to spend more time and money on improving security in 2006, the average budget increase among those companies was only 9 percent.

http://news.yahoo.com/s/zd/20060621/tc_zd/181598

Read more

Posts navigation

  • Previous
  • 1
  • …
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • …
  • 421
  • Next

Recent Posts

  • AI/ML News – 2024-04-14
  • Incident Response and Security Operations -2024-04-14
  • CSO News – 2024-04-15
  • IT Security News – 2023-09-25
  • IT Security News – 2023-09-20

Archives

  • April 2024
  • September 2023
  • August 2023
  • July 2023
  • June 2023
  • April 2023
  • March 2023
  • February 2022
  • January 2022
  • December 2021
  • September 2020
  • October 2019
  • August 2019
  • July 2019
  • December 2018
  • April 2018
  • December 2016
  • September 2016
  • August 2016
  • July 2016
  • April 2015
  • March 2015
  • August 2014
  • March 2014
  • August 2013
  • July 2013
  • June 2013
  • May 2013
  • April 2013
  • March 2013
  • February 2013
  • January 2013
  • October 2012
  • September 2012
  • August 2012
  • February 2012
  • October 2011
  • August 2011
  • June 2011
  • May 2011
  • April 2011
  • February 2011
  • January 2011
  • December 2010
  • November 2010
  • October 2010
  • August 2010
  • July 2010
  • June 2010
  • May 2010
  • April 2010
  • March 2010
  • February 2010
  • January 2010
  • December 2009
  • November 2009
  • October 2009
  • September 2009
  • June 2009
  • May 2009
  • March 2009
  • February 2009
  • January 2009
  • December 2008
  • November 2008
  • October 2008
  • September 2008
  • August 2008
  • July 2008
  • June 2008
  • May 2008
  • April 2008
  • March 2008
  • February 2008
  • January 2008
  • December 2007
  • November 2007
  • October 2007
  • September 2007
  • August 2007
  • July 2007
  • June 2007
  • May 2007
  • April 2007
  • March 2007
  • February 2007
  • January 2007
  • December 2006
  • November 2006
  • October 2006
  • September 2006
  • August 2006
  • July 2006
  • June 2006
  • May 2006
  • April 2006
  • March 2006
  • February 2006
  • January 2006
  • December 2005
  • November 2005
  • October 2005
  • September 2005
  • August 2005
  • July 2005
  • June 2005
  • May 2005
  • April 2005
  • March 2005
  • February 2005
  • January 2005
  • December 2004
  • November 2004
  • October 2004
  • September 2004
  • August 2004
  • July 2004
  • June 2004
  • May 2004
  • April 2004
  • March 2004
  • February 2004
  • January 2004
  • December 2003
  • November 2003
  • October 2003
  • September 2003

Categories

  • AI-ML
  • Augment / Virtual Reality
  • Blogging
  • Cloud
  • DR/Crisis Response/Crisis Management
  • Editorial
  • Financial
  • Make You Smile
  • Malware
  • Mobility
  • Motor Industry
  • News
  • OTT Video
  • Pending Review
  • Personal
  • Product
  • Regulations
  • Secure
  • Security Industry News
  • Security Operations
  • Statistics
  • Threat Intel
  • Trends
  • Uncategorized
  • Warnings
  • WebSite News
  • Zero Trust

Meta

  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org
© 2025 CyberSecurity Institute | Powered by Superbs Personal Blog theme