• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer
  • About
    • Secure360
    • UMSA
    • Get Involved
  • Events
    • Secure360 2021
    • Student360
    • Past Events
      • 2020 Secure360 Twin Cities
      • 2020 Student360
      • 2019 Secure360 Twin Cities
      • 2019 Student360
      • 2018 Secure360 Twin Cities
      • 2018 Secure360 Wisconsin
      • 2018 Student360
      • 2017 Secure360 Twin Cities
      • 2017 Student360
      • 2016 TC Secure360 Conference
      • 2015 Secure360 Conference
      • 2014 Secure360 Conference
      • 2013 Secure360 Conference
        • 2013 Secure360 Conference Speaker Presentations
      • 2012 Secure360 Conference
  • For Sponsors
    • Secure360 Twin Cities
    • Student360 Sponsors
  • For Speakers
    • Secure360 Speaker Details
    • Student360 Speaker Details
  • Blog
  • Nav Social Menu

    • Facebook
    • LinkedIn
    • Twitter
    • Vimeo

Secure360

Identify and combat cyber theft

March 5, 2014 by Secure360 and UMSA

cybercrime 2This past December, Kroll released their third annual cyber security forecast for the coming year. The trends they documented require organizations to strengthen safeguards and prepare to take stronger action to combat cyber theft in 2014. Taking a look at the trends they’ve shared in the report will help organizations identify and combat the increasing cyber threats.

The malicious insider

In the wake of Target’s breach, the insider threat has been getting some extra attention in the past couple months. That’s good, because the insider threat is definitely something organizations should be aware and wary of.

Kroll predicts that in 2014 at least 50% of breaches will come from a malicious insider. Combating these insider threats  will take collaboration, communication, human resources and information security. As lawmakers beef up privacy breach notification laws, organizations will have more and more access to information about insider breaches and how to prevent them.

Third-party vendors

Many companies use third-party vendors to process or store their data without giving much thought to the vendor’s privacy practices, assuming they are they same as theirs. The privacy policy of a third-party vendor may never be questioned until there is a breach and it’s too late. These subcontractors may not assist or even inform clients when data has been breached.

Vetting third-party vendors carefully and ensuring that their privacy policies are what they should be is an essential step that cannot be skipped. Before signing a contract, review their policies and make sure they’re technically, legally and procedurally up to working with your organization’s data. Communicate, audit and enforce vendor expectations to ensure vendor privacy practice compliance.

Tech tools

Having the right tools in place will help companies identify threats and breaches quickly and decrease reaction time. It may be impossible to prevent a breach, but if breached, organizations have better tools for seeing what information was accessed, what happened to it and how extensive the damage is.

Experian Data Breach Resolution recently released a new version of their data breach response guide that includes checklists and forms to help companies put a response plan in place.

Tech tools will likely continue to progress that help detect and map data breaches. The tools are getting smarter, trying to keep pace with cyber criminals, and keeping up with them, as well as with firewalls, will help companies identify and combat cyber theft.

When it comes to cyber crime, it’s important to remember that who is as important as how. There is a person behind every breach. Understanding the motivation and the tools cyber criminals will use to attack your data will help you gain the upper hand in the cyber war.

Filed Under: Business Continuity Management, Cybersecurity, Risk and Compliance

About Secure360 and UMSA

The Secure360 and UMSA team is made up of professionals in the security and risk management industries. Topics of expertise range from physical security, IT, risk management, cybersecurity, cloud, information security and records management.

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Categories

  • Uncategorized
  • Guest Posts
  • Business Continuity Management
  • News and Events
  • Physical Security
  • Cybersecurity
  • Professional Development
  • Risk and Compliance

latest tweets

  1. Secure360 Conference
    Secure360 Conference: As much as many of us enjoy it, there are risks to working from home, specifically as we rely more and more on the… https://t.co/S2nuIyWgjk
    about 2 days ago

  2. Secure360 Conference
    Secure360 Conference: The time to register is NOW, because today is the final day to score early bird rates. #Sec360 is the professional… https://t.co/rsIAkxmmCV
    about 3 days ago

  3. Secure360 Conference
    Secure360 Conference: We can never thank our wonderful #Sec360 sponsors enough! Silver Sponsors @AxoniusInc @BlackBerry @Fortinet and… https://t.co/pnYxfkR135
    about 4 days ago

Footer

Contact

For more information about UMSA events, contact: Marie Strawser

Email List Signup

Join our email list for monthly Secure360 news and updates!




Join our tradeshow email list for updates on sponsorship opportunities and upcoming exhibitor deadlines.

Sponsored by:
© 2021 Secure360. All rights reserved.