This article emphasizes the problem of employees being the greatest threat to information security. It mainly focuses on the fact that employees who are either careless, lazy, or forgetful and make it easy for hackers to gain unauthorized information. The survey conducted showed that the finance industry most…[Read more]
Cybersecurity Firm IDs New Apple-Targeting Malware
-This article is about the discovery of “WireLurker” being a malware that steals information from Chinese IOS systems through Apple devices connected to a computer through a USB cable. The…[Read more]
Article: U.S. government probes medical devices for possible cyber flaws
This article talks about the government suspecting flaws in hospital equipment that could be vulnerable to hackers.Fears of these devices being corrupted has led to…[Read more]
The security management system is major factor not only concerning the protection of assets but also assures a sense of integrity for the company and a boost in reputation for its clients/customers.
-This article talks about a Russian…[Read more]
Readings: Risk management is different from policies and compliance. Policies and compliance relate to set principles that need to be enforced in order for an area to remain compliant, kind of like checks and balances. Risk management is analyzing the processes of a business and researching the vulnerabilities of that process.
Home Depot is investigating a possible breach in their customer data and systems. A man by the name of Brian Krebs, who is an investigative cyber crime reporter, released on his blog that he found evidence of a data security breach of Home Depot’s…[Read more]