article thumbnail

P-to-P fraud most concerning cyber threat in 2023: CSI

CSO Magazine

Industry respondents also expressed concerns over identity theft at 4%, unavailable or unaffordable cyber insurance at 4%, geopolitical risks at 3%, DDoS attacks at 2% and website defacement at 0.9%, according to CSI’s annual survey of the financial sector.

article thumbnail

Inadequate Cybersecurity

Security Boulevard

It is customary to begin an article on cybersecurity with statements about huge increases in threats and attacks and mounting cyberspace losses from fraud, identity theft, ransoms, data exfiltration, blackmail, etc. Few, who confront cyber issues daily, question such assertions, but there are some who say “prove it!”

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Why you're probably doing endpoint security all wrong

CSO Magazine

The traditional combination of username and password to secure company devices and systems is outdated and could be putting your business at risk. Employing an AI based continuous identity management system could eliminate nearly all identity theft attacks as well as aid in security operations analysis of potential threats.

article thumbnail

Notification no-nos: What to avoid when alerting customers of a breach

SC Magazine

A simple, pro forma apology, a free comprehensive package of identity theft protection and credit file monitoring, and a public statement weeks or months after the breach is discovered,” said Winick. Sometimes, however, a business offers very little in the way of comfort, helpful information or restitution.

article thumbnail

Camera tricks: Privacy concerns raised after massive surveillance cam breach

SC Magazine

That type of information can be extremely valuable for things like identity theft.”. It’s best practice to keep a different set of credentials for each device because of exactly this risk.”. Kulkarni even suggested the footage could be enough to develop “deep-fakes that could impersonate you.”. Look at the Mac operating system.