Corporate Security
187 views | +0 today
Follow
Your new post is loading...
Your new post is loading...
Scooped by Background Checks
Scoop.it!

Facebook Launches Social network for Security Pros

Facebook Launches Social network for Security Pros | Corporate Security | Scoop.it
Facebook's new ThreatExchange will allow corporate security professionals to share cybersecurity information and better protect themselves from hackers.
Background Checks's insight:

With ThreatExchange, security pros can decide what they want to share and with whom, without worrying about disclosing sensitive information.


Scoop Via:  Background101.com

more...
No comment yet.
Scooped by Background Checks
Scoop.it!

Blackmail Lists? Bribery? Why Background Check Files Keep Getting Hacked - Nextgov

Blackmail Lists? Bribery? Why Background Check Files Keep Getting Hacked - Nextgov | Corporate Security | Scoop.it
There is a systemic effort underway by China and other adversaries to crib sensitive data on powerful people and covert operators in Washington, intelligence analysts say.
Background Checks's insight:

"They are all competing, and it is very cutthroat."



Scoop Via: Background101.com

more...
No comment yet.
Scooped by Background Checks
Scoop.it!

​Hacking after Sony: What companies need to know

​Hacking after Sony: What companies need to know | Corporate Security | Scoop.it
To protect themselves against cyberattacks, corporations require more than good security technology
Background Checks's insight:

The problem isn't simply that the hackers have advanced, it's that corporations have proven ineffective at detecting and dealing with breaches. 


Scoop Via: Background101.com

more...
No comment yet.
Scooped by Background Checks
Scoop.it!

Underpaid Employees Are a Cybersecurity Risk

Underpaid Employees Are a Cybersecurity Risk | Corporate Security | Scoop.it
The FBI says that internal hacking is on the rise. The research on employee theft suggests the solution might be simple
Background Checks's insight:

Stagnating wages and record company profits breed resentment


Scoop Via:  Background101.com

more...
No comment yet.
Scooped by Background Checks
Scoop.it!

"Schematics from Israel's Iron Dome missile shield 'hacked' by Chinese"

"Schematics from Israel's Iron Dome missile shield 'hacked' by Chinese" | Corporate Security | Scoop.it
Chinese military hackers have reportedly stolen “huge quantities of sensitive data” regarding Iron Dome, Israel’s US-funded, billion-dollar missile shield.
Background Checks's insight:

Israeli contractors Israel Aerospace Industries (IAI), Rafael Advanced Defense Systems, and the Elisra Group were all targeted.

more...
No comment yet.
Scooped by Background Checks
Scoop.it!

"Denial Of Service Attacks are Getting Worse"

"Denial Of Service Attacks are Getting Worse" | Corporate Security | Scoop.it
The denial of service attack gets few props for novelty in a field that prizes novelty. In a denial of service (DoS) attack, hackers flood a Web site or application with pointless requests that clog or overwhelm network resources and potentially shut it down. DoS is a cudgel, not a lockpick [...]
Background Checks's insight:
The U.S. and China are under the heaviest attack and are the countries from which the most cyber-grenades are thrown.
more...
No comment yet.
Scooped by Background Checks
Scoop.it!

How to Steal Ideas From Everybody You Meet

How to Steal Ideas From Everybody You Meet | Corporate Security | Scoop.it
All creativity begins with the moment of conception.
That little piece of kindling that gets the fire going. That initial source of inspiration that takes on a life of its own. That single note from
Background Checks's insight:

"Expose yourself to the best things that humans have done, and then try to bring those things into what you’re doing"

more...
No comment yet.
Scooped by Background Checks
Scoop.it!

""Three User-Friendly Strategies for BYOD Security""

""Three User-Friendly Strategies for BYOD Security"" | Corporate Security | Scoop.it
By Amit Jasuja, Senior Vice President, Java & Identity Management, Oracle In 1825 a painter named Samuel Morse was visiting New York City to fulfill a portrait commission and received word that his wife—at home in Washington DC—had fallen gravely ill. The following day, another messenger brought heartbreaking news: Morse’s wife [...]
Background Checks's insight:

Because personal work devices have proliferated so rapidly, CIOs have to build a strategy immediately.

more...
No comment yet.
Scooped by Background Checks
Scoop.it!

Explanations and Lessons from the Ddos Attack

Explanations and Lessons from the Ddos Attack | Corporate Security | Scoop.it
This last weekend was a tough one for our team as Scoop.it was sadly added to the growing list of websites that have been recently targeted by Ddos attacks. Following the first attack on Friday and our post on Monday, we’ve been up and running without interruptions but we nevertheless wanted to come back on some of your questions and give you as much clarity as we can. Continue reading →
Background Checks's insight:

""These attacks are an attempt at saturating and exhausting our servers""

more...
No comment yet.
Rescooped by Background Checks from Corporate Data Security Blog by SpectorSoft
Scoop.it!

Nine cybersecurity threats keeping companies up at night

Nine cybersecurity threats keeping companies up at night | Corporate Security | Scoop.it
App attacks, crimeware, skimmers, cyberespionage: We break down the latest Verizon data breach report.

Via SpectorSoft (www.spectorsoft.com)
Background Checks's insight:

Cybersecurity Threats Show No Signs of Slowing Down

more...
SpectorSoft (www.spectorsoft.com)'s curator insight, April 23, 2014 10:21 AM

Under #5 Insider Misuse, the article states: Bottom line: Trust no one. You want to trust your employees, however, we recommend: Trust but verify.

Scooped by Background Checks
Scoop.it!

How to Catch a Thief In Your Midst (When You're Not Norman Bates)

How to Catch a Thief In Your Midst (When You're Not Norman Bates) | Corporate Security | Scoop.it
The age old crime of embezzlement is alive and well, and so are other white-collar crimes. Here's how to protect yourself.
Background Checks's insight:

Human Resources Scoop Courtesy of:  Background101 - "Background Checks & Employee Screening" 866-744-6438 – http://background101.com 

more...
No comment yet.
Scooped by Background Checks
Scoop.it!

BYOD Programs Hampered by Security Issues

BYOD Programs Hampered by Security Issues | Corporate Security | Scoop.it
One of the major drivers in the bring your own device (BYOD) market is the need for enhanced mobile communication security.
Background Checks's insight:

BYOD "Bring Your Own Device" 

Scoop Courtesy of: Background101 - http://background101.com
Professional Background Checks & Employee Screening 866-744-6438

more...
No comment yet.
Rescooped by Background Checks from Corporate Data Security Blog by SpectorSoft
Scoop.it!

South Korean Data Breach Linked to an Insider

South Korean Data Breach Linked to an Insider | Corporate Security | Scoop.it
An employee at a credit ratings firm is alleged to have sold the personal data of up to 20 million people to marketing firms

Via SpectorSoft (www.spectorsoft.com)
Background Checks's insight:

Scoop Courtesy of: Background101 - http://background101.com
Professional Background Checks & Employee Screening 866-744-6438

more...
SpectorSoft (www.spectorsoft.com)'s curator insight, January 21, 2014 9:26 AM

Employee monitoring, especially privileged users, can help in several ways: first deterrence, next alerting, and if you're using Spector 360/Recon you can even investigate context to know who did what and when. www.spector360.com

Scooped by Background Checks
Scoop.it!

4 ways to protect your business against employee fraud and theft

4 ways to protect your business against employee fraud and theft | Corporate Security | Scoop.it
No matter how trustworthy you think your employees are, it's better to be safe than sorry.
Background Checks's insight:

"No one knows your company as well as you do."



Scoop Via: Background101

more...
No comment yet.
Scooped by Background Checks
Scoop.it!

Most Airport Employees Not Required to Undergo Daily Security Screenings: Report

Most Airport Employees Not Required to Undergo Daily Security Screenings: Report | Corporate Security | Scoop.it
The vast majority of airport employees with direct access to the tarmac and airplanes do not go through any daily security screening, and only two of the country's major airports have systems in pl...
Background Checks's insight:

Background Checks' Insight:


"We have a range of threats." 


Scoop Via: Background101.com

more...
Scooped by Background Checks
Scoop.it!

"Hackers Hit Banks as Everyone Spies on Everyone"

"Hackers Hit Banks as Everyone Spies on Everyone" | Corporate Security | Scoop.it

Hackers are increasingly stealing directly from banks and other companies and helping organized crime to operate more efficiently...

Background Checks's insight:

“Hackers have become capable of carrying out very advanced attacks."


Scoop Via:  Background101.com

more...
No comment yet.
Scooped by Background Checks
Scoop.it!

Ex-Employees Say Home Depot Left Data Vulnerable

Ex-Employees Say Home Depot Left Data Vulnerable | Corporate Security | Scoop.it
Before a major data breach, Home Depot was slow to raise its defenses against hackers despite alarms from security experts as far back as 2008.
Background Checks's insight:

"We Sell Hammers"


Scoop Via:  Background101.com

more...
No comment yet.
Rescooped by Background Checks from Corporate Data Security Blog by SpectorSoft
Scoop.it!

Could BYOD Increase Insider Threats?

Could BYOD Increase Insider Threats? | Corporate Security | Scoop.it
A new study predicts an increase in insider threats, but can lax BYOD security be to blame for some of that increase?

Via SpectorSoft (www.spectorsoft.com)
Background Checks's insight:

"What percentage of businesses have instituted a BYOD security policy???"

more...
SpectorSoft (www.spectorsoft.com)'s curator insight, June 25, 2014 10:13 AM

"The results of this survey should serve as a wakeup call to every executive with responsibility for protecting company or customer sensitive data."

Scooped by Background Checks
Scoop.it!

Google Glass Detector Can Cut Off Glassholes’ Wi-Fi

Google Glass Detector Can Cut Off Glassholes’ Wi-Fi | Corporate Security | Scoop.it
Not a fan of Google Glass’s ability to turn ordinary humans into invisibly recording surveillance cyborgs? Now you can create your own “glasshole-free zone.” Berlin artist Julian Oliver has written a simple program called Glasshole.sh that detects any Glass device attempting to connect to a Wi-Fi network based on a unique character string that he says he’s found in the MAC addresses of Google’s augmented reality headsets. Install Oliver’s program on a Raspberry Pi or Beaglebone mini-computer and plug it into a USB network antenna, and the gadget becomes a Google Glass detector, sniffing the local network for signs of Glass users.
Background Checks's insight:

A Glass-booting device is legal so long as the Glasshole.sh user is the owner of the network.

more...
No comment yet.
Scooped by Background Checks
Scoop.it!

China may have hacked your company, too!

China may have hacked your company, too! | Corporate Security | Scoop.it

By charging five Chinese officials with hacking into U.S. companies and stealing trade secrets, the Justice Dept. has added a new dimension to America’s national-security strategy. Yet the danger posed to the nation and its business sector may be far greater than even the government lets on.

Background Checks's insight:

"A typical corporate Cyber-Attack goes on for about 230 days before the company realizes something is wrong."

more...
No comment yet.
Scooped by Background Checks
Scoop.it!

Your new Android has been hacked, now what?

Your new Android has been hacked, now what? | Corporate Security | Scoop.it
Think your new smartphone is safe from cyberattacks? Think again. Many Android phones are vulnerable, as updates are not widely prevalent.
Background Checks's insight:
""70 percent of Android phones in use today still contain a bug uncovered by security researchers more than two years ago""
more...
No comment yet.
Scooped by Background Checks
Scoop.it!

Trade Secret Theft and Corporate Espionage

Trade Secret Theft and Corporate Espionage | Corporate Security | Scoop.it
It is imperative that U.S. companies understand how the theft of intellectual property assets routinely occurs and have knowledge of the laws, resources and processes that are available to protect and defend against the theft.
Background Checks's insight:

"The theft of intellectual property assets routinely occurs and costs corporations BILLIONS"

more...
No comment yet.
Rescooped by Background Checks from Corporate Data Security Blog by SpectorSoft
Scoop.it!

"4 types of employees who put your cybersecurity at risk, and 10 things you can do to stop them"

"4 types of employees who put your cybersecurity at risk, and 10 things you can do to stop them" | Corporate Security | Scoop.it

"The insider threat to workplace security is a serious–and growing–problem"


Via SpectorSoft (www.spectorsoft.com)
Background Checks's insight:

Set up a communications and training program so employees know all of the do's and don’ts when it comes to technology.

more...
SpectorSoft (www.spectorsoft.com)'s curator insight, April 11, 2014 11:16 PM

41 percent of IT security professionals regard “rogue” employees as the biggest security threat to their organizations—53 percent of the participants reported having experienced an “internal incident.

Scooped by Background Checks
Scoop.it!

How To Avoid Data Theft When Using Public Wi-Fi

How To Avoid Data Theft When Using Public Wi-Fi | Corporate Security | Scoop.it
Public Wi-Fi hotspots are inherently unsafe, as even a novice hacker can eavesdrop on your communications with surprising ease. Here are four easy steps you can take to protect your privacy and your data.
Background Checks's insight:

Human Resources Scoop Courtesy of:  Background101 - "Background Checks & Employee Screening" 866-744-6438 – http://background101.com 

more...
No comment yet.
Rescooped by Background Checks from Corporate Data Security Blog by SpectorSoft
Scoop.it!

"Four-fifths of all Irish data breaches come from firms' employees"

"Four-fifths of all Irish data breaches come from firms' employees" | Corporate Security | Scoop.it
IRISH companies are suffering data breaches in record numbers, according to a major new survey from The Irish Computer Society.

Via SpectorSoft (www.spectorsoft.com)
Background Checks's insight:

Data Security Scoop Courtesy of: Background101 - http://background101.com
Professional Background Checks & Employee Screening 866-744-6438

more...
SpectorSoft (www.spectorsoft.com)'s curator insight, January 22, 2014 9:26 AM

Survey shows that 80% of data breaches in Ireland are caused by employees. Proper employee monitoring to deter, detect and detail would greatly reduce that number and the costs associated to data breaches.