Human Error Accounts for Over 95 Percent of Security Incidents, Reports IBM
According to the IBM Security Services 2014 Cyber Security Intelligence Index, over 95 percent of all incidents investigated recognize human error as a contributing factor.
According to the IBM Security Services 2014 Cyber Security Intelligence Index, over 95 percent of all incidents investigated recognize human error as a contributing factor.
> In the case of large-scale retail data breaches, class action lawsuits have been brought against the corporations with claims that they did not implement strong enough security standards to keep consumer data safe.
The Weekly Ink is a summary of the top security content of the week injected with our own pointed opinions, and will be posted to our blog…well, weekly.
> No matter how many times default passwords are pinpointed as the culprit of a high-profile, wide-spread, massive-scale data breach, they’re still out there. On everything, from highway sign software, to ATMs, POS (Point of Sale) devices, television station broadcasting systems and more.
BYOD can introduce new security issues. Here are 5 ways your “bad” BYOD habits are rendered irrelevant by two-factor authentication and SSO.
Here are a few important qualities you should look for in a modern two-factor authentication solution, from cloud services to easy deployment and more.
Within the complexity of the manufacturing industry exist many security threats, including threats to Internet/intranet communications, intellectual property, global supply chain, proprietary business data and more.
> The federally mandated switch from paper records to digital records has the healthcare industry transitioning to the widespread use of electronic health record systems (EHRs), but application security is still a concern.
As we ring in the new year, it’s the perfect time to take a look back at Duo Security’s most notable 2013 milestones. The following blogs chronicle one great year leading the information security industry, from finding fixes for major Android vulnerabilities to attending the top hacker conventions, to signing on a major social media giant, and more - we’d like to give three cheers to our awesome year in 2013, and here’s to many more!
Learn how you can mitigate credential-stealing malware and protect yourself from all kinds of information security threats.