Menu

Blogs

Showing Blog Posts: 1–10 of 81 tagged Business

  • Do Data Breaches Affect Company Value?

    by Liviu Arsene on July 29, 2016

    With malware growing more prevalent, possibly nearing 600 million samples in 2016, the average cost of a data breach has been estimated to reach $4 million. Gartner, which had estimated worldwide spending on information security reaching $75.4 billion in 2015, sees a 26 percent probability that a company will experience one or more data breaches within a 24-hour period. While fixing a data breach…

  • How Cybersecurity Impacts Customer Loyalty

    by Alisdair Faulkner on June 21, 2016

    When it comes to banking, e-commerce and other online activities, fraud is one of consumers’ top concerns. In fact, insights from a recent First Annapolis and ThreatMetrix consumer study showed that more than half of consumers (55 percent) are extremely concerned about the risks of banking and payments-related fraud, with 46 percent indicating their fraud concerns have increased in the past two…

  • Small Business: Wake Up to Growing Cyber Threats

    by Robert Ackerman Jr. on June 3, 2016

    A few months ago, Rokenbok Education, a Solana Beach, Calif., maker of educational toys, was facing perhaps the quintessential nightmare of the 21 st century. Cyber criminals had encrypted the company’s computer files, rendering them useless. The hackers were deploying ransomware. If Rokenbok wanted the data unlocked, it would have to pay a ransom. As the New York Times reported, the company…

  • What Do Hackers Want from Professional Sports Teams?

    by Rook Security on June 2, 2016

    By Mike Patterson, Vice President of Strategy, Rook Security Recently, the Milwaukee Bucks basketball organization went public with a successful W-2 phishing attack that targeted its players and employees. While this is probably not the first attack of its kind, it is a new known data point in attacks against sports teams. In 2015, incidents targeted baseball player scouting data (involving the St. …

  • Saying Goodbye: Managing Security for Departing Personnel

    by RSAC Contributor on May 27, 2016

    By Kenneth Morrison, Principal, Morrison Consulting Personnel departures are a daily occurrence for large organizations, and small and medium-sized organizations need to manage them on a regular basis. The RSA Conference 2016 Peer2Peer session Saying Goodbye: Managing Security for Departing Personnel provided the opportunity for a great group of 25 attendees to talk to each other in a small…

  • There is Such a Thing as Security Return on Investment: Well, Sort of

    by Gib Sorebo on March 1, 2016

    Having spent a fair amount of time with critical infrastructure operators, I’ve gotten used to the groans and eye rolls I receive when I try to explain why they need to spend more money on cybersecurity. Whether it’s to satisfy a compliance requirement or to reduce the risk of a cyber attack by some incalculable amount, the common perception is that we’re getting in the way of a profitable…

  • Breaking Through to Users for Better Security, Inside Out

    by Jack Danahy on February 16, 2016

    In today’s world of big data, some of the most valuable information you can collect is simple insight into the people you’re trying to protect. Your users are all different, and to reach them you need to tailor your messages to address their individual interests, concerns, and needs. That’s where “personas” come in—by developing profiles of various types of users you can learn how to communicate…

  • Think Security Is Expensive? Insecurity Costs Much More

    by Tony Bradley on October 23, 2015

    Security has come a long way over the past decade. It is still the red-headed step child of the business units but at least most organizations have some sort of CSO or CISO role in place and do a good job feigning support for security. Businesses that focus on squeaking by spending as little as possible on security, though, are bound to find out the hard way just how expensive a lack of security…

  • Why It Costs More to Protect Your Virtual Infrastructure

    by Tony Bradley on October 19, 2015

    Security incidents are expensive, but not all security incidents are created equally. A recent study found that businesses pay a significant premium for incident response and recovery affecting a virtual infrastructure. Respondents representing more than 5,500 different companies across 25 different countries participated in the survey. The purpose of the survey was to learn more about the cost of…

  • How Much Will That Phishing Trip Cost You?

    by Tony Bradley on September 29, 2015

    Organizations spend a significant amount of money on security tools. All of the firewalls and antimalware solutions in the world, though, offer little protection against a phishing attack that tricks an authorized user into downloading malicious software or compromising credentials. Phishing attacks are becoming more effective and more costly as time goes on. The Ponemon Institute recently…

Are you interested in contributing to the RSA Conference blog?  Download our 2016 Editorial Calendar for more info.

This document was retrieved from https://www.rsaconference.com/blogs on Fri, 26 Aug 2016 01:08:17 -0400.
© 2016 EMC Corporation. All rights reserved.