INFORMATION

Site Map - Cybersecurity

Quick Bytes: Online fraud trends

- Online retailers are hit with fraud from international orders at a rate that is twice the overall average.

NEW IN PLAINTEXT: Securing Windows XP

- More than seven out of 10 home computers run Windows XP, so locking down these computers is an essential task, because poorly protected home computers are often the source of attacks against corporate networks.

Worth a Look: Web Browsing Under Wraps

- Anonymizer Anonymous Surfing prevents Web sites from collecting data from your visits because it creates an encrypted tunnel between your computer and the Anonymizer network while you surf; then, any page you visit will see Anonymizer’s IP address, not yours. The software installs after a quick download and can be used with either Internet Explorer or Firefox browsers.

Information Security Guidelines for Banks

- The guide defines important terms used in the security guidelines and then outlines the steps companies should follow to develop and implement an information security program, such as conducting assessments of internal and external threats. It also provides methods of assessing policies and procedures.

Pinning Down Online Money Laundering

- The government report notes with some alarm the rise in popularity of online payment services that can accept funds in different ways, including cash and money orders.

Quick Bytes: Data breaches

- More than half the retailers that collect information from consumers for promotions and marketing campaigns have assigned responsibility for protecting consumer-specific data to a security-program coordinator; an even greater number have provided training to employees regarding consumer privacy and information security.

Phone forensics

- Now that cell phones have morphed into miniature computers, they contain more information than ever before. In addition to phone numbers and a record of calls made and received, phones can now contain e-mail or text messages, photos, and a host of other data that could be of value when investigating a crime.

Quick Bytes: I hear you knocking

- Automated port scans, which look for open ports that might be candidates for exploitation, are sometimes likened to a thief rattling doorknobs, looking for one that’s unlocked.

Quick Bytes: Data Breaches

- More than half the retailers that collect information from consumers for promotions and marketing campaigns have assigned responsibility for protecting consumer-specific data to a security-program coordinator

Numbers

- 40 Percentage of companies that suffered a business disruption as a result of poor IT support

Phone Forensics

- Though the paper is aimed at investigators who already have some of the skills needed to do computer forensic investigations, it includes much information that will be of value to anyone who is interested in how cellular devices work and how they should be properly seized and analyzed.

Is ID Theft Rare, or Merely Well Done?

- Four widely publicized data breaches resulted in the compromise of around half a million customer names and Social Security numbers. How many of those consumers became victims of identity theft? Almost none—0.098 percent, or less than one in 1,000.

Aligning Security With Business Objectives

- The guidebook provides a five-step approach for CISOs to achieve success in their positions: assess, analyze, strategize, align, and communicate. PWC partner James Quinnild, one of the authors of the guidebook, says that the goal was to help CISOs succeed in a world that has changed dramatically from five years ago.
 




Beyond Print

SM Online

See all the latest links and resources that supplement the current issue of Security Management magazine.