Homepage This page's url is: -crn- Rankings and Research Companies Channelcast Marketing Matters CRNtv Events WOTC Jobs HPE Zone Intel Partner Connect Digital Newsroom Dell Technologies World Newsroom Dell Technologies Newsroom HP Reinvent 2020 Newsroom IBM Newsroom The IoT Integrator Lenovo Newsroom NetApp Data Fabric Intel Tech Provider Zone

10 Ways Hackers Will Get The Best Of You

An analysis of data breaches and security incidents provides insight into the top ways hackers can get the best of you and your business. Here are 10 of the most common threat actions pulled from the 2014 Verizon Data Breach Investigations Report.

Back 1 ... 8   9   10   11  


1. Privilege Abuse

Privilege abuse happens when an employee or trusted partner takes advantage of system access privileges that they are granted and use them to simply view files or conduct data theft, according to Verizon. The report said 88 percent of the insider misuse security incidents it analyzed involved some form of privilege abuse. The firm said its analysis found some cases of insiders being bribed to steal data for fraud schemes. Organizations need to more closely monitor employee activity, Verizon said. Quickly remove access to employees that leave the company. Monitor systems for unusual login attempts and other actions that could signal an issue. Limit access to the most sensitive systems and segment them from the rest of the network, Verizon said.

Back 1 ... 8   9   10   11  

sponsored resources