What You Should Know About Cyber Heists

A cyber heist is a robbery that occurs in cyberspace or on the Internet. Hackers usually compromise business networks with e-mail scams and phishing attacks. They also steal usernames, passwords, logon credentials, and challenge questions, and they disable alerts before initiating the heists through the bank. Cyber heists have increased in intensity and sophistication over the past three years. What can you do, as a customer, or as a financial institution, do to protect yourself?

Read more

Lower Cyber Risk and Reduce Liability with TBAT (Threat-Behavior-Attitude-Training)

If you haven’t seen stories about cybersecurity, data breaches, and hackers, then you either avoid the news or you live in a shoebox. If you are a business owner, you have a fiduciary responsibility to protect your company from known threats. Hackers today are a known threat, and statistics show that getting hacked is not a matter of if, but when.

Read more

Defending Against an IT Security Threat of Olympic Proportions

If you think defending your company’s network from security attacks is a full-time job, imagine having to pull together a team to protect one of the largest, yet temporary, networks of all time. That’s exactly what BT Security was asked to do for the 2012 Olympic Games in London.

Read more

Cryptography Tools and Techniques

Consider how many financial transactions are performed on the Internet everyday. Protecting all this data is of upmost importance. Cryptography can be defined as the process of concealing the contents of a message from all except those who know the key. Cryptography can be used for many purposes, but there are two types of cryptographic algorithms you need to understand, symmetric and asymmetric. Symmetric uses a single key, whereas asymmetric uses two keys. What else is required to have a good understanding of cryptography? It’s important to start with an understanding of how cryptography relates to the basic foundations of security: authentication, integrity, confidentiality, and non-repudiation.

The post Cryptography Tools and Techniques appeared first on Global Knowledge Blog.

Read more