Article posted: Aug 21, 2017

By Yvonne Möbius, HR, Versasec

U.K.-based analyst firm Juniper Research estimates criminal data breaches will cost businesses more than $8 trillion over the next five years. Juniper's new research report, "The Future of Cybercrime & Security: Enterprise Threats & Mitigation 2017-2022," also states that personal records stolen by cybercriminals will reach 2.8 billion in 2017 and almost double to 5 billion in 2020, despite new security technologies to thwart cyberattacks entering the market.

Continue Reading...

Article posted: Aug 09, 2017

By Adam Bostwick, Versasec

It's happened again: A third-party contractor has been deemed responsible for the latest, highly-publicized data breach. This time the company hit was Anthem, where a contractor has been charged with emailing a document containing more than 18,500 Anthem members' information to his personal email address. This information included Medicare ID numbers containing social security numbers, Health Plan ID numbers, as well as Medicare contract numbers and enrollment dates.

Continue Reading...

Article posted: Jul 10, 2017

By William Houry, Vice President of Sales

No matter the industry or its level of security, at least some employees at every enterprise today require access to their corporate networks via mobile devices. Most rely on physical smart cards for user authentication and access, yet there's another low-cost and even simpler solution: Just-in-Time (JIT) virtual smart cards (VSCs) (find more information about smart cards here: https://versasec.com/smart-cards.php).

Continue Reading...

Article posted: Jun 29, 2017

By Joakim Thorén, CEO

The recent Republican National Committee (RNC) data breach took center stage on June 20, 2017 as a huge security misstep. In fact, it was called "the mother lode of all leaks," in a recent article in Business Insider.

Continue Reading...

Article posted: Jun 28, 2017

By Nick Budden, Versasec Technical Consultant

Notch another victory for hackers, courtesy of weak passwords. It appears hackers were able to take down the British Parliament's email system by identifying accounts with weak passwords and breaching them.

Continue Reading...

Article posted: May 31, 2017

By Joakim Thoren, CEO

This week, Fortune reported Target reached an $18.5 million settlement with 47 states and the District of Columbia over a massive data breach in late 2013. The hits keep coming for Target: over the past four years, the mega retailer has shelled out $202 million as part of this costly data breach.

Continue Reading...

Article posted: May 18, 2017

By Joakim Thoren, CEO

Everyone is talking about the recent worldwide ransomware cyberattack, named WannaCry. A suitable name as the WannaCry ransomware attack was particularly vicious, shutting down hospitals and disrupting high-profile operations like Telefonica, FedEx and Renault.

According to a recent ECNMag article, this was the "largest ransomware attack observed in history." Europol Chief Rob Wainwright added, "More than 200,000 victims have been hit in 150 countries as of last week."

Continue Reading...

Article posted: May 09, 2017

By Joakim Thoren, CEO

Social engineering is a cybercriminal's best friend. That's according to Juniper Research, which recently published the "Cybercrime and The Internet of Threats 2017" whitepaper.

In its report, the Juniper team says that even with evolving methods for attempting unauthorized access of computing systems, the preferred route taken by most hackers is still this: duping users into opening the door. Simply put, cybercrime is often perpetrated through social engineering.

Continue Reading...

Article posted: Mar 17, 2017

By Joakim Thoren, CEO

News this week that Russian intelligence officers working with hackers were the masterminds behind the theft of 500 million Yahoo accounts is yet another cautionary tale for those who are not using two-factor authentication to protect their data.

While the salacious nature of foreign governments infiltrating the data of U.S. citizens is making headlines, home-grown hackers can inflict plenty of damage as well. Foreign or domestic, the hackers are out there. They want data and money and whatever else they can take.

Continue Reading...

Article posted: Jan 08, 2016

By William Houry, VP of Sales, Versasec

The year 2015 was rather illustrious for cyberattacks, with hacks both famous and even infamous. Among the most notable attacks – some for the sheer numbers of victims, some for who was hacked, and some for both – were the following:

Continue Reading...