<img height="1" width="1" style="display:none;" alt="" src="https://dc.ads.linkedin.com/collect/?pid=585074&amp;fmt=gif">

Fairdinkum Blog

Data Breach Scenario: Malicious Software - Financial Services Firms

Posted on November 13 , 2018

According to research from the Verizon RISK Team, few breaches are unique, meaning the vast majority of incidents are caused by a small number of scenarios. Verizon classifies 18 different data breach scenarios into four groups; the human element, conduit devices, configuration exploitation and malicious software. For the purposes of this article, we will focus on the malicious software that makes institutions vulnerable.

Read more »

Data Breach Scenario: The Human Element - Financial Services Firms

Posted on November 13 , 2018

While the news sensationalizes cyber threats from bad actors and nation states, the reality is that the largest threats to organizations are their own employees and contractors. Humans are vulnerable and prone to fall victim to schemes aimed at gaining access to company networks. For their part, the hackers are sly and cunning and know how to take advantage of the weak link. When organizations take the initiative to learn about common data breach scenarios, they can better prepare and protect themselves.

Read more »

Data Breach: The Importance of Protecting Your Customer Data - Financial Services Firms

Posted on November 08 , 2018

In today’s digital world, customer data is one of the most valuable currencies. Unfortunately, that makes it an incredibly attractive target for hackers, phishers, and other cyber criminals. In fact, an estimated 158,727 pieces of customer data are stolen every single hour.

Read more »

Data Breach Scenario: BYOD - Financial Services Firms

Posted on November 06 , 2018

What would happen to your brand trust if a personally owned device containing both personal and corporate data was lost or stolen?

Brand trust is paramount to the success and longevity of your business. While the creation of a separate interface for personal device traffic may seem inconvenient, it could prove to be one of the best security practices you implement.

Companies around the globe have identified the convenience of employees bringing their own device (BYOD) to work. In fact, 82% of companies allow the use of personal devices for work, but out of those companies, which support BYOD, 50% were breached through an employee’s personal device.

Read more »

Data Breach: Weak Configuration - Financial Services Firms

Posted on November 06 , 2018

Weak Configuration: An Open Invitation for Cyber Exploitation

Technology devices don’t have a corner on weak configurations. System network configurations can be just as weak - especially when it comes to password protection. Weak configurations can be devastating to institutions holding large amounts of (sensitive) data such as financial services firms.

Read more »
Page 1 of 3
1 2 3
»