Blog Banner

Cybercrime Case Study: Verizon Lessons Learned

(Scenario 1 - Social Engineering)

The Verizon RISK Team performs cyber investigations for hundreds of
commercial enterprises and government agencies annually across the globe.
In 2015, we were retained to investigate more than 500 cybersecurity incidents
occurring in over 40 countries. In 2008, the results of our field investigations
were the genesis of the first Data Breach Investigations Report (DBIR), an annual
publication that dissects real-world data breaches with the goal of enlightening
the public about the nature of the threat actors behind the attacks, the methods
they use, including the data they seek, and the victims they target.

Critical Infrastructure: A New Cyberthreat Vector

Hackers are taking aim at the power grid and nuclear facilities

For anyone who still thinks that hackers are going after the mainframe, there's good news afoot: They're not. In fact, mainframes have been borderline obsolete for about a decade now. At this point, they're mostly good for spare parts.Anyone who is concerned that ISIS might be trying to wiggle their way into the power grid to create mass chaos, or that air conditioners can be used to create a large-scale blackout, on the other hand, is very much on to something. Contact Us

How are you celebrating National Cyber Security Awareness Month?

LIFE'S A BREACH: CYBER RISKS ARE CREATING GREATER DEMAND FOR CYBERSECURITY TALENT

October 2015 is a month like any other, with one exception: the U.S. Department of Homeland Security has officially designated it National Cyber Security Awareness Month. And what a month it has been so far. Information technology professionals, cybersecurity experts and public relations departments at multiple high-profile corporations have had their hands full trying to mitigate the damage caused by a bevy of big breaches. 

The Cybersecurity Domino Effect

Due to the fact that so many networks are now interconnected in the business world, focusing solely on one organization's security will do no good in the long run. Instead, experts have to look closely at  every interdependent company within the chain to ensure the safety of data for just one. If even one company is at risk, or worse, breached, the safety of all others is threatened. For IT professionals gaining CompTIA security certification or company IT training, it is vital to know how every branch would be affected if a large attack occurred. This domino effect is important to keep in mind as there continue to be advances in cybersecurity.

Become a Certified Ethical Hacker (CEH)

BUSINESSES NEED CERTIFIED ETHICAL HACKERS

It should be no surprise amid the constant barrage of headlines about cyber-security incidents that the number and cost of breaches is on the rise.

RSS

Contact author

x

Subscribe for Future Blog Notifications