Press Release, Author at Security Boulevard
Keeping Your Business Safe from CEO Fraud

Keeping Your Business Safe from CEO Fraud

| | News and Views
According to the FBI, it’s a 12.5 billion dollar problem: CEO fraud cost global businesses $12,536,948,299 between October 2013 (when formal reporting to the Internet Crime Complaint Center (IC3) began) and May of 2018. But this figure, however alarming it sounds, likely represents only the tip of the iceberg when ... Read More
The Marriott Data Breach: 5 Vital Takeaways to Keep Your Business Safe

The Marriott Data Breach: 5 Vital Takeaways to Keep Your Business Safe

| | News and Views
To recap one of the major events in 2018—500 million customer records from the Starwood Hotels and Resorts guest reservation database had been compromised—shocked and dismayed industry leaders, lawmakers and consumers alike. Not only was this breach one of the largest in history, but the personal information accessed was also ... Read More
Ken Xie, Fortinet | Fortinet Accelerate 2017

What’s The Value Of Your Data? And How Can You Protect This Asset?

| | News and Views
Late in the autumn of 2016, Microsoft announced that its purchase acquisition of LinkedIn had been finalized for a price of $26.2 billion. The deal attracted a great deal of scrutiny from investors, and attention from commentators, who calculated that Microsoft had paid about $260 per monthly active user. LinkedIn ... Read More
Why Are Phishing Attacks Still So Effective?

Why Are Phishing Attacks Still So Effective?

| | News and Views
The more the threat landscape diversifies and changes, the more it stays the same. Some of the oldest tactics in cybercriminals’ playbooks remain the most prevalent and successful. In 2018, as in years past, the vast majority of data breaches were accomplished by criminal actors external to the targeted organization ... Read More
Keeping Your Data and Applications Safe in the Cloud

Keeping Your Data and Applications Safe in the Cloud

| | News and Views
When cloud-based services first became popular more than a decade ago, business leaders embraced their versatility, scalability and predictable costs, but many did so with a sense of unease: was their valuable data truly safe when housed in an offsite data center to which they had no physical access? Would ... Read More
Does PCI Compliance Equal Security?

Does PCI Compliance Equal Security?

| | News and Views
As we talked about in last week’s post, the PCI Data Security Standard has established a near-universal set of technical and operational requirements to which all businesses that process credit card transactions must adhere. Accepting card-based payments is the norm in the hospitality sector—it’s a must for any hotel or ... Read More
PCI DSS Basics

PCI DSS Basics

| | News and Views
PCI DSS Basics: What Leaders Need to Know When You Required to Comply to PCI DSS The global hospitality industry has long been an attractive target for cybercriminals trying to pilfer credit card data. Hotels and restaurants were among the first businesses to adopt card-based payments: the world’s first charge ... Read More
PoSeidon Malware

PoSeidon Malware

| | News and Views
Keeping Your Hospitality Business Safe from PoSeidon Malware POS compromise remains alarmingly prevalent among hotel businesses, restaurants and retailers today. Although security breaches involving point-of-sale terminals received a great deal of mainstream media attention back in 2013 and 2014, attackers continue to target hotels and restaurants with malware-based attacks on ... Read More
3 Key Lessons That Hospitality Industry Leaders Must Learn from the Sabre Reservation System Hack

3 Key Lessons That Hospitality Industry Leaders Must Learn from the Sabre Reservation System Hack

| | News and Views
2017 was a peak year for data breaches. In terms of both size (number of records compromised) and frequency of attacks, 2017 stands among the worst years in history, with 2,600,968,280 records breached in more than 1,765 individual incidents, according to the annual Breach Level Index (BLI) report. Though large-scale ... Read More
The Cyber Kill Chain: What You Need to Know

The Cyber Kill Chain: What You Need to Know

| | News and Views
What is a Kill Chain? The term “kill chain” was originally used in the military. In October 1996, after the first Gulf War, General John Jumper formalized the methods necessary to compress the time it takes to find and kill the enemy on the battleground. He termed it “compressing the ... Read More
Loading...