Tag Archive for: Compromising

How to ensure new graduates aren’t compromising enterprise networks

With college graduations now behind students, many young people might already have secured jobs even before they crossed the stage with their degrees in hand. With these fresh-faced employees on the payroll, now businesses must make sure their security habits are in line with today’s policies.

New graduates aren’t just bringing their skills and experience to the workplace – they’re also bringing poor cybersecurity habits. Recent studies have shown Millennials are generally indifferent about data security, says David Meyer of OneLogin, an identity access management company.

With many new grads choosing to use applications and devices that have not been approved by corporate IT, there is no easy way to monitor usage to ensure data remains secure. Considering the average cost of a cyber breach is approximately $ 3.8 million, it’s in a company’s best interest to exercise precaution as they welcome entry-level employees into the ranks, he says.

To read this article in full or to leave a comment, please click here

(Insider Story)
Network World Security

Hackers hit UK phone retailer, possibly compromising data of up to 2.4M customers

Cyberthieves broke into the IT systems of Carphone Warehouse, a large cell phone retailer in the U.K., and may have stolen personal and bank data of up to 2.4 million customers and the credit card details of up to 90,000 customers.

Specifically, the division that was attacked operates the OneStopPhoneShop.com, e2save.com and Mobiles.co.uk websites, and provides services to iD Mobile, TalkTalk Mobile, Talk Mobile and some customers of Carphone Warehouse, the company said Saturday in an emailed statement.

The attack, which the company described as “sophisticated,” was discovered Wednesday afternoon, and likely happened at some point in the two weeks prior to the discovery. Carphone Warehouse has secured the breached systems, put in place additional safety measures and hired a security company to determine what data was compromised. It is also notifying customers that could be affected.

To read this article in full or to leave a comment, please click here

Network World Security

How Android Leverages Open Hardware Without Compromising Security – ARC


ARC

How Android Leverages Open Hardware Without Compromising Security
ARC
Because of the media echo chamber Google started a public dialog about the state of Android security to for the sake of transparency. In doing so, Google did something that no other mobile or PC company has done before. When Google first spoke openly …

and more »

“android security” – read more