article thumbnail

Four questions for a casino InfoSec director

CIO Business Intelligence

Recent cyberattacks at MGM Resorts and Caesars Entertainment have put the spotlight on cybersecurity practices at casinos – and the importance of educating employees on social engineering tactics. As learned from recent cyberattacks, user education has become a critical component to protecting against these threats as well.

article thumbnail

Four of the Biggest Financial Data Breaches of 2019

Galido

What caused the security failure is not yet known, but the exposed documents were viewable to anyone without the need for authentication. After Capital One discovered the breach in July, they found around 80,000 linked bank account numbers, 140,000 social security numbers, and 1 million Canadian social insurance numbers were exposed.

Financial 100
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Understanding the Essential Pillars of Phishing Mitigation

SecureWorld News

These attacks can come from malicious instructions, social engineering, or authentication attacks, as well as heavy network traffic. The most common root causes for initial breaches stem from social engineering and unpatched software, as those account for more than 90% of phishing attacks.

article thumbnail

The Small Business Guide to Information Security

Galido

One of the best and first things that you should do to ensure information security in your business is to install a firewall. A firewall acts as the first line of defense and will alert you of intrusions. The FCC recommends that all small businesses have some sort of firewall that will set a barrier between crucial data and attackers.

article thumbnail

A CISO POV: Securing AI in your company

CIO Business Intelligence

Firewall capability for AI security: Enhance security measures by providing firewall capabilities to safeguard against potential AI-related vulnerabilities. We all know that well-intended workers will figure out how to use it without going through the corporate firewalls. How has AI penetrated the typical enterprise?

Company 73
article thumbnail

Beyond the Office: Securing Home Devices and Networks Against Corporate Breaches

SecureWorld News

If you use a corporate BYOD for work, it is best to avoid using it for home entertainment activities, like playing games or browsing social networks. Staying safe on social networks Prioritize safe communication habits on social media platforms. Fully utilize firewall capabilities.

Network 81
article thumbnail

Pandemic Planning - CIO Style

CIO Musings

Social Distancing" will influence your plans to a large degree. Can your firewall/IDS/IPS support more bandwidth? On-boarding If you have processes for on-boarding employees for VPN access, multi-factor authentication, loaner laptops, web site changes, MIFIs, etc. Citizens may refuse to come to city hall.

Meeting 195