How User Credentials Are Stolen

Posted by Brian Dunn on May 21, 2015 12:34:00 PM

Already, 2015 has seen a substantial increase in cyber-attacks by cyber criminals to steal large volumes of data and credentials. These attacks include theft of users’ credentials—such as passwords, usernames, e-mail addresses—and other forms of Personally Identifiable Information (PII) used by customers, employees, and third parties.  User credentials can be stolen in many ways and the cyber-attack taxonomy can be quite confusing.  Among them can include:

Read More

Topics: identity fraud, data breach

The Importance of Identity Management: Understanding the Lesson of the Target Breach

Posted by Kevin Lancaster on Apr 22, 2015 9:45:00 AM

With the ever growing accessibility of personal devices to organizational networks, identity management has never been of higher importance in both the public and private sector. Organizations’ IT networks contain an endless amount of sensitive data, and without proper authentication protocols, this data is at constant risk of breach. In the commercial space, the retailer Target’s breach in late 2013 was a difficult reminder that not addressing cyber risks on every level of your organization can lead to severe ramifications and security compromises.

Read More

Topics: cyber security, identity fraud, data breach

Subscribe to Updates


benefits-of-a-GSA-schedule

Posts by Topic

see all

Subscribe to Email Updates