Or is it? User information of approximately 2,000 British Gas users were posted online recently, but the company said the information didn’t come from its systems, and that there was no breach. Hmm.
As breaches become the norm, a more realistic approach is to create a strong incident response process and team. Tom Cross gives his tips for a successful incident response effort.
People are using more technology in their lives every day, and as good as that may sound, it also means that any data breach will be very expensive.
The majority of website attacks against SMEs remain undetected because of the high level of sophistication of these attacks, as well as the low level of security awareness among the victims.
As you may have seen yesterday, Carphone Warehouse has been hit by a major hacking incident, and the Information Commissioner’s office is now looking into the matter.
Although the deadline for support has now passed, it's not too late to get things back on track. By implementing safeguarding measures, IT departments can better prepare themselves.
Small to medium sized businesses lack the resources they need to protect themselves against malware attacks, says new study.
You wouldn't wait until someone breaks into your house to install a burglar alarm, so why take the same approach with private data? Here's how to secure yourself against theft, the right way.
According to the results of a survey which questioned 500 attendees at Infosec 2014, half of security pros run risks with data on the move.
Avast has suffered a major security breach, and has taken its forums down while they’re shifted to a new software platform.
1