Enterprise Tech News Spotlight: Social Security Number Theft, Data Breach Cost, Hacking as Warfare, PCI Compliance
Data breaches continue impact the way enterprises secure and monitor their information systems. Hackers are laser-focused on stealing personal identifiable information and going after large-scale data theft, especially in the public sector. As cyberattacks increase in sophistication, enterprise organizations must be cognizant of the many elements involved in a data breach. This week, I’m showcasing articles that highlight what enterprise organizations need to know about cybersecurity and how to avoid data theft.
Theft of Social Security Numbers is Broader Than you Might Think
As cyberattacks continue, analysts are seeing a new pattern: Hackers are focused on stealing personally identifiable information. That includes the security clearances of U.S. intelligence officers, with the reported theft of background information. It also includes information that's less sensitive but far-reaching — like Social Security numbers. (NPR)
How to Measure the Cost of a Data Breach
Businesses typically have a hard time quantifying potential losses from a data breach because of the myriad factors that need to be considered when doing the math. This article highlights Verizon’s and the Ponemon Institute’s insight about the best approach to take for estimating the cost of a data breach. (Third Certainty)
Hacking and the Future of Warfare
Officials are still working to figure out whether the theft of data from the Office of Personnel Management may also include sensitive information about contract workers and family members of employees who underwent background checks — and it's not clear whether hackers could use the data they have to identify U.S. spies or other intelligence personnel. But it is clear that large-scale data theft is a major problem facing the United States. (Nextgov)
Four Things Businesses Need to Know About Payment Card Compliance
Rapid7 produced an infographic looking at PCI compliance, cybersecurity and new related requirements for penetration testing. Based on data from the Verizon 2015 PCI Compliance Report it sets out four things enterprises should know about going into PCI compliance. (Beta News)
Firewalls Sustain Foundation of Sound Security
Enterprise security necessitates a hierarchy of technologies and processes, and history has proven the firewall as a foundational element of that matrix. As networks evolve and expand far beyond traditional concepts of the corporate perimeter – driven by mobility, virtualization and the cloud – models of security management have also transformed rapidly. (Dark Reading)
Visit the Verizon Enterprise Solutions’ Products and Services Center to learn how to improve your business with the latest technologies and network solutions.