Data Breach Security From A To Z


Keylogger Trojans help cybercriminals capture credit card numbers, account credentials and other sensitive bank account data by recording the keystrokes of a victim's system. Most keylogger programs run covertly to avoid alerting the user that their actions are being monitored, according to the Verizon Data Breach Investigations Report. Verizon recommends businesses restrict user administrative rights, issue one-time passwords for IT admin access to endpoint systems, employ Web content filtering and blacklisting, and conduct security awareness training to help end users avoid being infected by a keylogger.

Get a roundup of CRN's security coverage right to your inbox with the Security Advisor newsletter.