Charging Your Mobile Phone: New Threat To Data Security

Research indicates that mobile devices and the data they contain can be compromised by simply plugging into a computer using a USB cable. Charging a mobile device by plugging it into a computer initiates a connection that involves an exchange of data between the devices. The amount of data transferred depends on the mobile device,…

Malware Is Surging: How Can Employers Avoid Being Swamped?

Experts recently released a report of malware attacks on U.S. organizations of varying sizes. They found that 46 percent of respondents experienced an attack that had significant repercussions on their business operations. These attacks included ransomware, distributed denial of service (DDoS), and advanced persistent threats (APT) like keyloggers or phishing. The report indicates organizations spend…

The Fraudster In The Office Next Door

KPMG, a global tax and financial auditing firm, recently released a study that examines the characteristics of workplace participants who commit fraud. The study, which evaluated 750 cases of fraud, found that 44 percent of cases involved a fraudster who had “unlimited authority” in their organization. In fact, 34 percent of the fraudsters were executives…