Prilock Security Training Blog

Securing Digital Lives

Top Most Effective Attack Methods

Researchers for the new ‘Hacker’s Playbook’ analyzed 4 million breach methods from an attacker’s point of view to gauge the real risks today to enterprises.

No organization is immune to the risk of a data breach. Security leaders who want to assume the strongest protection must analyze their security posture from a hacker’s point of view to understand risk, validate security controls, and prioritize resources. Continue Reading…

Potential CalOptima PHI Data Breach Affects 56K Members

Recent cases of data security incidents, some including possible PHI data breaches, involve employees downloading data, a ransomware attack, and a cybersecurity incident.

The California health system CalOptima is reporting a potential PHI data breach stemming from an August 17, 2016 incident. This is the second data security incident CalOptima has reported in the last month.Continue Reading…

Are You Afraid of Getting Hacked, But Not Doing Much About It?

A hack at Sony Pictures that exposed more than 170,000 emails in 2014 derailed a much-hyped film’s release and prompted a months-long industry freakout. A hacking incident at Yahoo now threatens to derail a sale to Verizon. WikiLeaks’ releases of Democratic officials’ hacked private emails are providing near-endless fodder for Donald Trump’s presidential campaign.Continue Reading…

Why Medical Breaches Run Rampant and What Can Be Done to Stop Them

While the deep web isn’t all bad, there are plenty of shady areas where it earns a bad reputation.  Researchers at the Institute for Critical Infrastructure Technology discovered that firsthand. While compiling research for a new study, they stumbled upon marketplaces where users can buy prescription drugs, access government and pharmacy databases, and buy medical information from stolen electronic health records.

Continue Reading…

7 Social Media Security Best Practices

Why Social Media Security Matters:

  1. Social media is an often overlooked area when it comes to information security. Because social is sometimes treated like a personal communication tool rather than a business platform, risk monitoring & governance, employee security awareness and corporate security policies are rarely in place. But social is undeniably a business system, one that we use daily to communicate with our customers, grow our revenues and engage our employees. In fact, organizations spend on average almost 25% of their entire marketing budget on social.Continue Reading…

Do You Have a False Sense of IT Security?

Moving from a false sense of security to actual security requires action. While employing perimeter measures and accounting for the unpredictable human element in a security solution are large parts of a comprehensive plan, the best plan is one that assumes a breach, hack or disaster will happen.

By being prepared, IT security rests on actionable and tangible plans instead of just the hope that a breach won’t happen. Replacing that false sense of security with real solutions is a constant work in progress, but there are some basic things every IT team can do.Continue Reading…

Work-at-Home Jobs: Often Laundering Stolen Money for Hackers

Hackers who raid corporate bank accounts often launder stolen funds by depositing them in accounts owned by “money mules,” people recruited through work-at-home job scams. The mules are usually instructed to wire the stolen funds to the scammers. Increasingly, however, the mules are being directed to send the funds using bitcoin ATMs, according to KrebsOnSecurity.Continue Reading…

Page 19 of 51« First...10...1718192021...304050...Last »