Monthly Archives: October 2014

Charles Leaver – Reports Reveal Identity Fraud Surge And Malware Problems Increasing

This post has been composed by Charles Leaver, CEO Ziften Technologies.

In a report it was exposed that breaches of consumer data indicates that there are a growing number of identity thefts being carried out these days. This is very disconcerting for everyone.

The report was performed by the National Consumers League and it reveals that in the year 2013, around 33% of consumer data breaches caused identity scams, and this means that the figure has actually tripled since the year 2010. This worrying rise can be explained by some clear factors. Cyber bad guys are employing a lot more advanced strategies now and there is a lack of cyber attack laws that force companies to disclose when they have had an attack. To make matters worse there are few organizations using endpoint detection and response systems to safeguard their data. All this means that we are entering an environment where consumers are finding that their data is constantly under attack by deceitful hackers.

John Breyault, who is a member of the National Consumers League, specified that cyber attack breach legislation like the one operating in California can help with the reduction of breach reverberations by mandating the companies that have actually been attacked to rapidly get the word out.

He went on to say that after a breach prompt notice is needed so that people can conduct a “harm analysis” once they learn about a breach. This is everyone’s right and at the moment the type of issue that would set a notice in motion remains very broad.

Sadly, it is not just identification theft that is under the spotlight. A different report revealed that malware is now more widespread than it ever was.

 

Every Third Computer Has A Malware Infestation Revealed In A Report

 

The Anti Phishing Workers Group released a report specifying that malware was most likely to be present in approximately a third of the computer systems across the world by the final quarter of 2013. This is a substantial boost when compared with the previous quarter states Tech News World. The technical director of a security lab that investigates cyber attacks, Luis Corons, stated that new malware strains are being created at an extremely rapid pace and that malware infections might increase even further.

He specified that the development of new malware samples has just skyrocketed and it has actually doubled from the last quarter of 2013 to the very first quarter of 2014.

The findings of these 2 reports underlines the fact that there is no space for complacency in organizations when it comes to security. Every organization needs to sure up its endpoint detection and response systems or face the fact that a cyber attack is increasingly most likely to be coming their way.

 

 

 

Charles Leaver – Fines Are In Place For Malware And Breaches So Implement Defenses

With malware becoming more stealth and the fines that business face when they suffer a breach from it makes the case for executing endpoint detection and response systems even more vital than it was in the past. Without the ideal defenses executed there is not only the threat of a significant cyber attack, but likewise fines and suits that can be extremely damaging to a business. If a business thinks that it is insusceptible to cyber attacks then they are being arrogant and ignorant. The cyber crooks out there are making their attacks almost undetectable these days.

Major Malware Danger Now Averting Detection

 

Embedding a secret message into something unforeseen is called steganography and is not something brand-new that has arrived with the Web. In the 1600’s, Gaspar Schott produced a book which explained how a secret message could be concealed in a musical arrangement and that this could be decrypted by those that knew about it. The approach utilized was the notes on the score would represent a letter of the alphabet and for that reason the message could be checked out.

This practice has some worrying ramifications as it supplies an almost foolproof way of hiding details that should not exist. Cyber crooks have been using steganography for several years now. It was reported in a Federal Plan Cyber Security which was released by the National Science and Technology Council in 2006, that steganography represents a specifically sneaky way for terrorists to penetrate U.S. systems.

The report specified that these tools are affordable and widespread making steganography an enabling technology for the foes of the United States.

Nowadays cyber security attacks are rampant and hackers are leveraging steganography to carry out attacks that are nearly undetectable and extremely advanced. In a paper on the dangers of steganography, it was specified that there is momentum gathering in its use amongst cyber lawbreakers who can use the approach to breach networks without detection. The report went on to say that Internet based steganography has actually ended up being a lot more sophisticated and will just end up being more so in the years to come.

While steganography does pose a huge threat it can be reduced by executing an endpoint detection and response system. This system will carefully see all locations where a cyber lawbreaker might gain access and it is advised that organizations take this essential action.

 

The Charges Are High For Organizations That Suffer A Cyber Attack

 

The danger of a steganographic attack must definitely be enough for you to implement an endpoint detection and response system however if it isn’t then the significant fines that your company can be confronted with for a breach ought to be. Any company is vulnerable to attacks and fines. As an example of this the Women and Infant Hospital in Providence, Rhode Island, needed to pay $150,000 as a result of a cyber attack which saw the details of 12,000 people jeopardized. The Modesto Bee specified that the data that the hospital lost consisted of Social Security numbers, dates of birth and even ultrasound images.

The business world can also suffer at the hands of a cyber attack. eBay dealt with a lawsuit from a customer in Louisiana after they were attacked according to Computerworld. Colin Green, who filed the lawsuit, is not alone in being discontented and represents millions of people who were not delighted that their personal data was exposed when the cyber attack occurred at eBay. The possible fines and lawsuits make the investment in a proven endpoint detection and response system truly rewarding.

 

Charles Leaver Ziften CEO