Retailers Are Hardest Hit by Malware

Those in the retail sector who have not yet suffered a breach may see one in the future.

Examining the 657 breaches that have been self-reported to California between 2012 and 2015, California Attorney General Kamala Harris has issued a report that summarizes the types of breaches that have occurred and provides suggestions about what companies can do to potentially avoid incidents.

According to the report, malware and hacking have resulted in the largest number of breaches—and the largest number of individuals impacted. Leading the pack in the type of data impacted was social security numbers and medical information. In terms of industry share, the retail sector reported the largest number of breaches to California (25% of breaches and 42% of the records breached).

Based on the findings, Harris recommended, among other things, that companies “make multi-factor authentication available on consumer-facing online accounts that contain sensitive personal information,” that they use strong encryption for portable devices, and that they encourage individuals impacted by a breach to get fraud alerts. The report also recommended harmonization of state breach notice laws.

TIP: The report suggests that  It also gives an idea of what state regulators might expect from companies with respect to security measures the companies have in place.

Lexology:

« Cyberattack Paralyzed U.S Hospital
Tor: Mystery Spike In Hidden Addresses »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Waterfall Security Solutions

Waterfall Security Solutions

Waterfall Security is focused on protecting critical infrastructure and industrial control systems from remote online cyber attacks,

Ethio-CERT

Ethio-CERT

National Cyber Emergency Readiness and Response Team of Ethiopia.

Komodo Consulting (KomodoSec)

Komodo Consulting (KomodoSec)

Komodo Consulting specializes in Penetration Testing and Red-Team Excercises, Cyber Threat Intelligence, Incident Response and Application Security.

ObjectSecurity

ObjectSecurity

ObjectSecurity is a leader in authorization policy automation. With OpenPMF, you can manage application security policies for access control and auditing.

RevenueStream

RevenueStream

RevenueStream uses an innovative algorithmic approach to intercept and prevent payment fraud before it even happens.

Modux

Modux

Modux focus on a number of core competencies across cyber security including; cyber intelligence & analytics, penetration testing and training.

H3C Group

H3C Group

H3C provides a full range of Computer, Storage, Networking and Security solutions.

Ensign InfoSecurity

Ensign InfoSecurity

Ensign InfoSecurity is Southeast Asia’s largest pure-play cybersecurity firm.

Axiomtek

Axiomtek

Axiomtek is a leading design and manufacturing company in the industrial computer and embedded field.

Cloud & Cyber Security Expo

Cloud & Cyber Security Expo

Cloud & Cyber Security Expo is the UK’s largest cloud and cyber security event.

Telstra

Telstra

Telstra is one of the world's leading telecommunications and technology companies, offering a wider range of services from networks and cloud solutions to mobility and enterprise collaboration tools.

ZX Security

ZX Security

ZX Security is a New Zealand owned and operated cyber security consultancy.

risk3sixty

risk3sixty

Risk3sixty are information and cyber risk management craftsmen helping build business-first security and compliance programs.

DynTek

DynTek

DynTek delivers exceptional, cost-effective professional IT consulting services, end-to-end IT solutions and managed IT services.

Custom Computer Specialist (CCS)

Custom Computer Specialist (CCS)

CCS offers an extensive range of services including cybersecurity solutions, consulting, implementation, and support to help our clients maximize the value derived from IT investments.

CLEAR

CLEAR

With more than 17 million members and a growing network of partners across the world, CLEAR's identity platform is transforming the way people live, work, and travel.