• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer
  • Student360
  • About
    • Secure360
    • UMSA
  • Secure360 2022
  • For Sponsors
  • For Speakers
  • Get Involved
  • Blog
  • Nav Social Menu

    • Facebook
    • LinkedIn
    • Twitter
    • Vimeo

Secure360

Identify and combat cyber theft

March 5, 2014 by Secure360 and UMSA

cybercrime 2This past December, Kroll released their third annual cyber security forecast for the coming year. The trends they documented require organizations to strengthen safeguards and prepare to take stronger action to combat cyber theft in 2014. Taking a look at the trends they’ve shared in the report will help organizations identify and combat the increasing cyber threats.

The malicious insider

In the wake of Target’s breach, the insider threat has been getting some extra attention in the past couple months. That’s good, because the insider threat is definitely something organizations should be aware and wary of.

Kroll predicts that in 2014 at least 50% of breaches will come from a malicious insider. Combating these insider threats  will take collaboration, communication, human resources and information security. As lawmakers beef up privacy breach notification laws, organizations will have more and more access to information about insider breaches and how to prevent them.

Third-party vendors

Many companies use third-party vendors to process or store their data without giving much thought to the vendor’s privacy practices, assuming they are they same as theirs. The privacy policy of a third-party vendor may never be questioned until there is a breach and it’s too late. These subcontractors may not assist or even inform clients when data has been breached.

Vetting third-party vendors carefully and ensuring that their privacy policies are what they should be is an essential step that cannot be skipped. Before signing a contract, review their policies and make sure they’re technically, legally and procedurally up to working with your organization’s data. Communicate, audit and enforce vendor expectations to ensure vendor privacy practice compliance.

Tech tools

Having the right tools in place will help companies identify threats and breaches quickly and decrease reaction time. It may be impossible to prevent a breach, but if breached, organizations have better tools for seeing what information was accessed, what happened to it and how extensive the damage is.

Experian Data Breach Resolution recently released a new version of their data breach response guide that includes checklists and forms to help companies put a response plan in place.

Tech tools will likely continue to progress that help detect and map data breaches. The tools are getting smarter, trying to keep pace with cyber criminals, and keeping up with them, as well as with firewalls, will help companies identify and combat cyber theft.

When it comes to cyber crime, it’s important to remember that who is as important as how. There is a person behind every breach. Understanding the motivation and the tools cyber criminals will use to attack your data will help you gain the upper hand in the cyber war.

Filed Under: Business Continuity Management, Cybersecurity, Risk and Compliance

About Secure360 and UMSA

The Secure360 and UMSA team is made up of professionals in the security and risk management industries. Topics of expertise range from physical security, IT, risk management, cybersecurity, cloud, information security and records management.

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Categories

  • Uncategorized
  • Guest Posts
  • Business Continuity Management
  • News and Events
  • Physical Security
  • Cybersecurity
  • Professional Development
  • Risk and Compliance

latest tweets

  1. Secure360 Conference
    Secure360 Conference: With #Sec360 2022 officially in the books, we wanted to share a little recap of the fun! https://t.co/iMPwAp1Kac … https://t.co/kk7xRUXoRo
    about 6 hours ago

  2. Fusion Learning Partners
    Fusion Learning Partners: Congratulations @UMSAOrg on a successful 2022 #Secure360 event! We are honored to be part of your conference team &… https://t.co/RbT7IEG49G
    about 8 hours ago

  3. smallarmy
    smallarmy: @TylerCohenWood @Secure360 Good
    about 1 day ago

Footer

Contact

For more information about UMSA events, contact: Marie Strawser

Email List Signup

Join our email list for monthly Secure360 news and updates!




Join our tradeshow email list for updates on sponsorship opportunities and upcoming exhibitor deadlines.

Sponsored by:
© 2022 Secure360. All rights reserved.