What do 40 percent of folks aged between 18 and 48 never do unless they don't have a choice? Change their passwords.
It's one of the many pieces of data uncovered by security outfit Fortinet after canvassing members of both Generation X (ages 33 to 48) and millennials (ages 18 to 32), half male and half female. The resulting poll assesses the generational differences in attitudes toward passwords, personal data security, and privacy.
Stolen account credentials played a part in the recent Target Corporation payment card data breach. With approximately 40 million customers’ credit and debit card information exposed, stolen credentials from a third party vendor highlighted the weak security that often surrounds internal passwords.
Companies are no longer tolerant of security-and-compliance teams telling them they cannot go to the cloud. The benefits of cloud technologies are too many to ignore in a business strategy: commodity pricing, flexible scaling, low staff needs, and (for SAAS) a rent-to-own model.
This slideshow features five important lessons learned and key takeaways from recent data breaches for businesses that want to protect themselves from similar disasters, as identified by Mark McCurley, senior information security advisor of IDentity Theft 911
The relentless consumerization of enterprise IT policies and practices will extend to mobile device security over the next few years as more and more companies turn to biometric authentication technologies to lock down corporate data and devices.
Organisations spend a lot of time and effort protecting their networks from external attacks. However, it is insider threats that are viewed as one of the biggest risks to corporate data according to IT decision makers surveyed in the Cyber-Ark 2012 Trust, Security & Passwords report.
As the adoption of cloud-based applications increase and more IT departments embrace BYOD, employees, contractors, partners and customers are all accessing corporate applications and data from multiple devices across all global regions.
When individual developers think of open source, they think "free." And with good cause: Who in their right mind wouldn't be interested in technology that they can get at no cost and use with few licensing restrictions?
Wikipedia: Is a property of access control of multiple related, but independent software systems. With this property a user logs in once and gains access to all systems without being prompted to log in again at each of them.