Search This Blog

Monday, February 02, 2009

Data-breach costs rising, study finds; A clever way to increase employee awareness about phishing

Ponemon Institute's "2008 Annual Study: Cost of a Data Breach"
Network World logo

Security Alert

NetworkWorld.com | Security Research Center | Update Your Profile


Sponsored by Qualys
rule

Preparing for the Next Cyber Attack.
Ensure you are up-to-speed on the latest security technologies available to keep your network safe in this Executive Guide. Get a thorough assessment of the corporate security threat landscape. Protect your network with data leakage protection, NAC and other technologies explained in this report. Download this Executive Guide now.

rule

Spotlight Story
Data-breach costs rising, study finds

Ellen Messmer By Ellen Messmer
Data-breach impact's costs are rising, according to the Ponemon Institute's "2008 Annual Study: Cost of a Data Breach," which found the total cost of a reported incident rose to $6.6 million per reported breach, up from $6.3 million last year. Read full story

Related News:

A clever way to increase employee awareness about phishing In April 2008, thousands of high ranking corporate executives received an email message informing them that they were being subpoenaed by the United States District Court in San Diego. The official-looking notice, which was personalized with the executive’s name, company and phone number, informed the recipient that he was required to appear before a grand jury in a civil case. An attachment supposedly contained a copy of the full subpoena. Anyone who clicked on the attachment – and who among us wouldn’t? – unwittingly downloaded and installed a keystroke logger and other malware that allows remote control of the PC.

Human error caused Google search bug Human error caused a glitch that returned the message "this site may harm your computer" for all Google search results for about an hour Saturday morning, the company said.

Podcast: Securing Super Bowl 43 Bob Cannon from Johnson Controls, a systems integrator, talks about the physical security systems at Raymond James Stadium in Tampa Bay, site of this year's Super Bowl. The network he and his team built allow multiple agencies access cameras and other systems through a single network. (11:09)

Microsoft charges employee with spying Microsoft has filed a lawsuit against a former employee, charging him with taking a job at the software giant in order to steal information that would be helpful in his patent infringement case against the company.

Microsoft Surface is watching you watching Super Bowl If you're in Tampa this weekend for Super Bowl, your every move will be monitored by authorities presiding over Microsoft Surface.

Cisco Security Expert: Jamey Heary: Cisco updatest SSL VPN with performance boost, Windows Mobile support Cisco recently released a new version of its Anyconnect SSLVPN client that adds support for Windows Mobile 6.1, 6.0 and 5.0 touch-screen devices.

Cloud computing and compliance: Be careful up there Using the cloud for data processing and storage may have its advantages in terms of simplicity and cost, but ensuring regulatory compliance will not be nearly so simple.

Podcast: 5 Ways Employees Can Sabotage Your Network With a poor economy and layoffs looming at a company, the most trusted employees can often turn and become an insider threat. Tim Connelly from Netcordia discusses five different ways that they can attack your network as a way for revenge or even profit (from data theft). (7:36)

Podcast: Protecting against insider threats in a down economy With the economy in the tank and employees anxious about their jobs, corporations have to be extra vigilant against insider threats. Phil Neray of Guardium shares tips on how to monitor for potential inside jobs and how to be prevent losses. (16:44)

Podcast: Who's Stealing Your Data? It's well known that insiders within your company are more likely to steal data than outside hackers, but who are these people? What types of people are the most likely to try and grab confidential data, and how? Keith Shaw talks with Imprivata CTO David Ting (pictured) about why certain employees try to steal data, and five steps that IT can take towards preventing insiders from taking your data (20:08).


Betting on SuperNAP
In Las Vegas, data center takes power and cooling to the limitIn Las Vegas, data center takes power and cooling to the limit.

Data gone missing
10 woeful tales of data gone missing10 woeful tales involving backup tapes: some current, some classic and one just plain unusual.

Sponsored by Qualys
rule

Preparing for the Next Cyber Attack.
Ensure you are up-to-speed on the latest security technologies available to keep your network safe in this Executive Guide. Get a thorough assessment of the corporate security threat landscape. Protect your network with data leakage protection, NAC and other technologies explained in this report. Download this Executive Guide now.

rule

Effectively Managing Change.
Find the right network/system management platforms that leverage the latest IT technologies in this Executive Guide, "The New Network/System Management Challenges." Get a handle on server sprawl, managing 802.11n wireless LANs, and data center automation tool integration. Confidently deploy innovative technologies that drive efficiencies today.
Download this Executive Guide now.


Everybody says "Do more with less!"
But no one tells you how. We will and it costs nothing to find out at IT Roadmap Conference and Expo. Coming to 10 cities in 09 including New York in February, Denver in March, Chicago in April.
Register now, attend free

 

02/02/09

Today's most-read stories:

  1. Ex-Fannie Mae employee accused of planting computer time bomb
  2. Fan starts campaign for Windows 7's immediate release
  3. Windows 7 will not sway XP users
  4. Google M-Lab provides a window into your ISP
  5. Don't fear the penguin: A newbie's guide to Linux
  6. 10 woeful tales of data gone missing
  7. IPhone takes 1.1% of the mobile phone market
  8. Worm floats Obama's head on your desktop
  9. Taser-wielding boss? Can't get to me here
  10. Are these the real reasons for the fall of Nortel?


Preparing for the Next Cyber Attack.
Ensure you are up-to-speed on the latest security technologies available to keep your network safe. Get a thorough assessment of the corporate security threat landscape. Protect your network with data leakage protection, NAC and other technologies.
Download this Executive Guide now.



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues
of Network World Magazines, in print or
electronic format, free of charge, Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network
World newsletter, change your e-mail
address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments: