It is undeniable that internal controls facilitate data security, but a company’s culture can play an even larger role. Awareness is key, and it starts at the top.
Vendor Security
TeamViewer Bolsters Security After Account Takeovers
TeamViewer, which provides remote support and access, has announced that it is strengthening security controls after a rise in corporate account takeovers. A company spokesman noted that many consumer accounts used “the same account credentials across multiple internet accounts.”
‘Panama Papers’ Spill Insider Secrets
The 11.5 million leaked documents reveal alleged money laundering, tax avoidance and sanctions dodging by heads of state, politicians, celebrities and other fraudsters.
Verizon Confirms Breach Affecting Business Customers
Verizon has released a statement confirming that “Verizon Enterprise Solutions recently discovered and fixed a security vulnerability on our enterprise client portal. Our investigation to date found an attacker obtained basic contact information on a number of our enterprise customers.” Experts believe the exposure of the clients’ contact information leaves them more vulnerable to phishing attacks.
Toymaker VTech Hacked: 200,000 Kids’ Data Exposed
VTech has issued a notification that customer accounts and related kids profiles worldwide have been affected. User profile information includes name, email address, password, secret question and answer for password retrieval, IP address, mailing address and download history. Moreover, children’s name, gender and birthdate were also stored.
Dell Acquisition of EMC Has Big Cybersecurity Implications
The $67 billion acquisition makes it the largest the technology industry has ever seen. Dell will ramp up its existing powerhouse of security components (SecureWorks, SonicWALL and Quest Software) with the addition of EMC’s RSA product offerings.
How to Mitigate Vendor Risk in a Cybersecurity Environment
Organizations seeking to protect sensitive data from cybercriminals must worry about more than their own operations when assessing potential threats. Vendors represent one of the highest risk areas in an organization’s cybersecurity structure. Here’s what you need to know when vetting vendors’ security practices.