In the rush to deflect blame in the wake of an insider attack, many organizations fail to answer critical questions that could help them avoid similar cases of employee fraud in the future.
By integrating phishing intelligence with an SIEM solution, security analysts can proactively monitor APTs and manage risks related to phishing attacks.
Outgoing employees are motivated by revenge, greed and resentment to abscond with valuable data. A robust exit process is the key to preventing IP theft.
The Syrian Electronic Army gave Forbes and the rest of the Internet an ugly new reason to not use the same login information across multiple accounts.
Between key-logging malware, phishing schemes and e-commerce sites, there are many ways cyber criminals can steal corporate credentials and commit fraud.
After several prominent Twitter accounts were hacked by attackers, it is clear that corporate credentials need to be protected by stronger security tools.