How to Shop Online Like a Security Pro

Krebs on Security

‘Tis the season when even those who know a thing or two about Internet scams tend to let down their guard in the face of an eye-popping discount or the stress of last-minute holiday shopping. How do you know the lifespan of a site selling that must-have gadget at the lowest price?

How To 280

How to Punish Cybercriminals

Schneier on Security

There are approximately 300,000 reported malicious cyber incidents per year, including up to 194,000 that could credibly be called individual or system-wide breaches or attempted breaches. This is likely a vast undercount since many victims don't report break-ins to begin with.

How to Maximize Data Used to Fight Fraud

Data Breach Today

Splunk's Jim Apger on Streamlining Omni-Channel Defenses The data being used to drive effective anti-fraud efforts can be rich in context and useful for other activities.

How To 194

Cyber Exposure: How to Discover, Measure and Reduce Your Risk

Data Breach Today

Tenable's Diwaker Dayal on Benchmarking the Success of Your Security Posture How does an organization measure cybersecurity success? For too many, it's simply the absence of a breach.

Risk 187

How to Predict Insider Fraud

Data Breach Today

How To 146

New Hacker Exploits and How to Fight Them

Data Breach Today

Dan Larson of Crowdstrike discusses some the new techniques hackers are using and how to fight them off Dan Larson of Crowdstrike on Battling New Attack Techniques Hackers are constantly developing new exploits, and updating defenses is not an easy task.

How To 160

How to Avoid Card Skimmers at the Pump

Krebs on Security

But according to police in San Antonio, Texas, there are far more reliable ways to avoid getting skimmed at a fuel station. Booth said the SAPD has yet to see a skimming incident involving newer pump models like the one pictured directly above.

How To 208

How to Use FDA's Medical Device Cybersecurity 'Playbook'

Data Breach Today

aims to assist healthcare delivery organizations in responding to cybersecurity incidents involving medical devices. Julie Connolly, who helped develop the guide, explains how to use it A new "playbook" co-developed by the Food and Drug Administration and Mitre Corp.

How to Future-Proof the Critical National Infrastructure

Data Breach Today

Design Cyberattack Resilience Into Technology, Says Professor Prashant Pillai The challenge when designing technology for critical national infrastructure sectors is that it must be securable today and remain resilient to cyberattacks for decades to come, says cybersecurity Professor Prashant Pilla

How To 148

How to lose your password

Thales Data Security

The tsunami of passwords that exist across every aspect of our digital life means that there’s a thriving underground industry of cyber-criminals trying to get at them. Equifax – I could go on, but you might want to play with this visualisation instead.

How to detect a data breach

IT Governance

Having systems in place to help identify and contain breaches promptly should be a priority for all management teams. Organisations must also deploy modern breach detection tools, and keep as up to date as possible with the constantly evolving threat landscape. The need for speed.

How to Find Your Netflix Freeloaders—and Kick Them Out

WIRED Threat Level

Sharing is caring. But it's worth checking if your streaming accounts have picked up any suspicious stragglers along the way. Security

How to create a risk assessment matrix

IT Governance

To comply with ISO 27001 , the international standard for information security, you need to know how to perform a risk assessment. This process is at the core of your compliance measures, as it helps you identify the threats you face and the controls you need to implement.

Risk 74

The Marriott Hack: How to Protect Yourself

WIRED Threat Level

Up to 500 people's personal information has been stolen in a Marriott hack that lasted four years, one of the biggest breaches yet. Security

How to build a cyber incident response team

IT Governance

Having a cyber incident response team ready to go can save your organisation from disaster. Crooks are constantly poised to exploit vulnerabilities and employees use complex IT systems where mistakes are bound to happen. How to assemble the team. How to get started?

GUEST ESSAY: The case for engaging in ‘threat hunting’ — and how to do it effectively

The Last Watchdog

Modern cyber threats often are not obvious – in fact it is common for them to lurk inside a business’ systems for a long time without anyone noticing. This is referred to as ‘dwell time’, and a recent report from the Ponemon Institute indicates that the average dwell time is 191 days. To achieve this for your organization, it is no longer possible just to run reactive cyber security. So, what do you need to get started?

How To 142

How to write a disaster recovery plan

IT Governance

All organisations experience disruptions, whether that’s from a cyber attack, IT failure, weather event or something else, and they need to be prepared. The longer it takes to address an issue, the more the costs will spiral and the harder it will be to recover.

How to Prevent SQL Injection Attacks

eSecurity Planet

Your company's website does not have to be the next victim of a SQL injection breach. Here's how to prevent SQL injection attacks

How To 113

How to Secure ‘Permissioned’ Blockchains

Thales Data Security

Permissioned blockchains are growing in popularity as businesses attempt to cash in on the blockchain trend while keeping a firm hand on the tiller. The post How to Secure ‘Permissioned’ Blockchains appeared first on Data Security Blog | Thales e-Security.

How to Use the NIST Cybersecurity Framework

Data Breach Today

Specific Actions for Organizations to See Success in their Cybersecurity Programs By focusing on the cybersecurity actions, NIST CSF can be flexibly deployed regardless of the setting or industry

Strong, streamlined and secure: How to get the most out of centralized key management

Thales Data Security

With organizations around the world now deploying ever-increasing amounts of encryption solutions in an effort to ward off cybercrime, businesses are facing a combination of challenges. Using algorithms to encode data as ciphertext, encryption acts as a safety blanket for data.

How To Protect Yourself From Hackers

Cyber Info Veritas

Would you like to know how to protect yourself from the ever-present threat of cybercrime perpetrated by black hat hackers? Their main aim is to exploit your “mistakes and vulnerabilities” to blackmail you into sending them money or they’ll leak your private data.

How to Properly Back Up Your Data

Record Nations

According to Forbes, 90% of all data has been created in the last two years, and by the year 2020, one-third of all data will pass through the cloud. All data that you are responsible for needs to be backed up, safely and securely. […].

Cloud 52

How to document your information security policy

IT Governance

With cyber security affecting businesses worldwide, it is important that all organisations have a policy in place to state and record their commitment to protecting the information that they handle. The board and management have to be completely behind and committed to the ISMS.

How to claim compensation for a data protection breach

IT Governance

Organisations need to be much clearer about what information they’re processing, what it’s being used for and how data subjects can review and request changes to their data. You might therefore prefer to make a claim directly.

Cryptocurrency Miners: How to Shield Browsers From Bad Guys

Data Breach Today

Browsealoud Subversion Points to Larger Trust Issues With Third-Party Code Attackers recently snuck cryptomining code onto thousands of websites by inserting it into a third-party accessibility plug-in called Browsealoud.

How to choose the best B2B Integration software & cloud solutions in 2019

OpenText Information Management

B2B integration software and cloud solutions offer the ability to … The post How to choose the best B2B Integration software & cloud solutions in 2019 appeared first on OpenText Blogs. This is the 21st century. We can do incredible things with digital technologies.

B2B 61

How to prepare for a penetration test

IT Governance

Rather, it requires a lot of skill and experience, as testers need to know what vulnerabilities to look for, where to find them and how to exploit them. All testers should follow a series of steps to guide them through the process, which we’ve outlined here.

How To Manage Holiday Card Fraud

Rippleshot

More than enough to check it once.or Being prepared to combat holiday card fraud means proactively preparing long before the storm hits. As a refresher for 2018, we’ve brought back our team’s tips on what issuers can do to manage incidents during this peak fraud

Tips 52

How to Secure US Elections - Before It's Too Late

Data Breach Today

Two cybersecurity veterans detail the specific steps the Trump administration must take now if it has any hope of safeguarding the U.S. midterm elections in November against Russian interference, whether via hack attacks or social media and propaganda campaigns

How to make diversity the norm in technology

OpenText Information Management

From 3D printing of organs to AI-powered grocery stores, technological advances are making incredible things possible. But what happens to technology when diverse voices and experiences aren’t represented at the design table?

Experts demonstrate how to exfiltrate data using smart bulbs

Security Affairs

The experts focused their study on devices using the Low Energy Attribute Protocol ( ATT ) to communicate. In this way, the researchers discovered the commands sent by the mobile app to the smart bulbs. The stolen information is sent to an attacker using a BLE light bulb nearby.”

How To 110

Threat Hunting: How to Evolve Your Incident Response

Data Breach Today

Tom Field and Ben Smith of RSA Security reflect on key findings from their recent Executive Roundtable on threat hunting

How To 100

How to Store Medical Records: Finding the Best Strategy

Record Nations

Medical records require thoughtful and careful handling due to the sensitive information they contain. When choosing how to store your medical records, you have several option. The post How to Store Medical Records: Finding the Best Strategy appeared first on Record Nations.

How to Preserve Your Old Documents While Growing Digitally

AIIM

On one hand, you need to keep them stored away so that they don’t obstruct your daily work and clutter up the workspace. On the other, however, when you do need the documents, you need to be able to locate them quickly and not waste hours trying to figure out where they might have ended up.

How to choose the best big data analytics software in 2019

OpenText Information Management

All companies are faced with an explosion in the volume and variety of data that they have to deal with. There is simply too much for traditional analytics techniques and solutions to cope with. Big data analytics is near the top of every CIO’s agenda.

Threat Hunting: How to Evolve Your Incident Response

Data Breach Today

Tom Field and Ben Smith of RSA Security reflect on key findings from their recent Executive Roundtable on threat hunting

How To 100

How to Control What Websites Can Do on Your Computer

WIRED Threat Level

If you're not careful, websites can grab all kinds of permissions you don't realize or intend. Take back control in your browser. Security

How to create a business continuity plan – with free template

IT Governance

Comprehensive BCM (business continuity management) measures are essential for responding effectively to a disruption and providing a minimum acceptable service during a disaster. Details of how and when the BCP will be invoked.

How to Check If Your Facebook Account Got Hacked—And How Badly

WIRED Threat Level

Here's how to see if you were affected. Facebook Friday offered more details about its recent breach. Security