SIM Swap Scams + Consumerization = TPRM Risk

SIM Swap

SIM Swap Scams + Consumerization = TPRM Risk

by Sabine Zimmer | December 12, 2019 | Data & Cybersecurity, Hacking, Mobile Devices

SIM swap scams can be extremely expensive to individual consumers -- one investor lost more than $23.8 million worth of cryptocurrency to a SIM card hijacking in 2018. These hacks also represent a growing third party risk as the use of cell phones and related consumer technologies continue to increa ....

Shared Assessments Program Addresses Recommendations of Russian Hack Report for Improved Security

January 13, 2017 | Cyber Crime, Cyberattacks, Cybersecurity, Data & Cybersecurity, Hacking, Program Tools, Security, Third Party Risk Management, Tools & Templates

The Threat Horizon The December 29th joint analysis report (JAR) GRIZZLY STEPPE – Russian Malicious Cyber Activity, contains specific indicators of cyberattacks and steps organizations can take to mitigate the “the tools and infrastructure used by the Russian civilian and military intelligence S ....

At the Heart of the Cyber Security Skills Shortage

September 7, 2016 | Cyberattacks, Cybersecurity, Data & Cybersecurity, Hacking

Three recent studies demonstrate that organizational and IT department leadership sit squarely at odds with several important challenges to improving IT-related risk postures: Predictions that organizations do not plan to increase the level on hand security expertise; A well-documented and loomin ....

Visual Hacking: Who’s Looking Over Your Shoulder?

November 24, 2014 | Cybersecurity, Data & Cybersecurity, Data Breach, Hacking, Privacy

I recently attended the Ponemon Institute’s Responsible Information Management (RIM) Renaissance Privacy Event. While headlines and discussion continue to focus on cybersecurity; privacy professionals also had good conversations about the basics of visual privacy. Protecting confidential informati ....