We use cookies to deliver you the best experience on our website. By continuing to use our website, you consent to our cookie usage and revised Privacy Statement.

Filter By:



Recent Blogs & Podcasts

Content Aggregator

\ Content Aggregator 

Vetted, curated, third party sourced information security content in downloadable PowerPoint format to support internal communications to the C-suite, Board, and lines of business.

IANS Content Aggregator

August 14, 2018 | Threats & Incidents

 Phishing/Social Engineering Most Common Causes of POS-System Compromises

Phishing and other social engineering facilitate nearly half (47 percent) of the POS-system compromises investigated by Trustwave. These can happen when administrators don’t properly segregate the cardholder data environment from the rest of the network. Remote access was the second leading cause of POS compromise (23 percent), followed by malicious insiders at 13 percent.

Read More »

August 13, 2018 | Threats & Incidents

 Ransomware: Overview of Impact on Users and Downtime

The average number of users impacted in a given ransomware attack was 22, with an average downtime of 14 hours. Those organizations with the most hours of downtime tended to be the mid-market (1000-5000 employees) and enterprise (5000+) organizations.

Read More »

August 9, 2018 | Threats & Incidents

 Overview of Data Breaches by Industry

The healthcare sector experienced the most data breaches in 2017, followed by accommodations and the public sector. The manufacturing industry had the fewest data breaches reported in 2017.

Read More »

August 6, 2018 | Threats & Incidents

 Retail Data Breaches: Most Frequently Targeted Assets

In the retail sector, web application servers were targeted in data breaches 52 percent of the time. Gas pump terminals were targeted 22 percent of the time. Database servers and ATMs were a distant third and fourth at 4.7 percent each.

Read More »