Remove Cybersecurity Remove Data privacy Remove Information Security Remove Social Engineering
article thumbnail

Tim Hortons Privacy Investigation, Social Engineering Kill-Chain, Hospitals Sending Facebook Your Data

Security Boulevard

The Tim Hortons mobile app created a “a mass invasion of Canadians’ privacy” by conducting continuous location tracking without user consent even when the app was closed, what is a social engineering kill-chain and how can this help understand and prevent attacks, and new research shows 33 out of the top 100 hospitals in America […].

article thumbnail

Magnificent Seven: Celebrating Great Women in Cybersecurity and Data Protection

BH Consulting

That inspiration is needed, because inequality and gender representation still need to improve in cybersecurity. Even though girls outperform at school, just 26 per cent of people under the age of 30 working in cybersecurity are female, according to ISC2. They are paving the way for the next generation of cybersecurity professionals.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Keyavi Data Shares Best Practices for Keeping Data Private as a Champion of Data Privacy Week

CyberSecurity Insiders

–( BUSINESS WIRE )– Keyavi Data Corp. , Poor password hygiene habits are still very commonplace, and compromised credentials are one of the top causes of data breaches, costing companies millions of dollars annually,” said T.J. Now data itself IS the fortress, delivering the ultimate in peace of mind to Keyavi’s customers.

article thumbnail

Alyssa Miller: Charting the Course Through InfoSec and Aviation

Security Boulevard

In this episode, special guest Alyssa Miller joins the hosts for an insightful and entertaining conversation covering a broad range of topics from social engineering anecdotes involving Kevin Johnson to Alyssa’s journey in aviation and being a pilot.

InfoSec 69
article thumbnail

News alert: AppDirect poll reveals company leaders losing sleep over cyber risks, compliance

The Last Watchdog

But that’s not enough to assuage their anxiety and instill confidence that they’re well protected against security threats. Their top areas of concern include cybersecurity risk (58%), information security risk (53%) and compliance risk (39%). Human error is among the top causes of security breaches.

article thumbnail

Most Common Causes of Data Breach and How to Prevent It

Security Affairs

Some malware attacks install tools like keyloggers to capture the keystrokes for stealing passwords or other sensitive information. Social Engineering It’s been found that almost one-fourth of the data breach is carried out by using social engineering. Consumers should be wary of their data as well.

article thumbnail

DuckDuckGo Browser Allows Microsoft Trackers, Stolen Verizon Employee Database, Attacking Powered Off iPhones

Security Boulevard

The post DuckDuckGo Browser Allows Microsoft Trackers, Stolen Verizon Employee Database, Attacking Powered Off iPhones appeared first on The Shared Security Show.