Cybersecurity and Data Breaches: What Marketing Directors Need to Know

Digital technology has opened many new doors for organizations, enabling greater brand engagement and innovative customer experiences. But, at the same time, it has also exponentially multiplied the points of vulnerability for data breaches and theft of proprietary data. With the increased use, integration, and interconnection of mobile devices, security is even more imperative. This is particularly vital for marketers who must incorporate security into their strategic marketing plans and determine how new security solutions can deliver valuable customer insights.

One of the most important defenses any company has against cyber threats is a widespread and deeply rooted culture of security, shared by all employees, that is bolstered by exemplary leadership, regular training, strong policies and enforcement.

More from Advertising Age by clicking here

Phone hackers develop dialing software to steal billions

Bob Foreman’s architecture firm ran up a $166,000 phone bill in a single weekend last March. The swindle, which on the web is easier to pull off and more profitable, affects mostly small businesses and cost victims $4.73 billion globally last year.“I thought: ‘This is crazy. It must be a mistake,’ ” Mr. Foreman said. It wasn’t…

More from Finance pages by clicking here.



Underpaid Employees Are a Cybersecurity Risk

Cybersecurity breaches such as those at Target (TGT), Home Depot (HD), and JPMorgan Chase (JPM) are expensive and embarrassing. While attacks may come from outside hackers, the FBI recently issued a warning that internal hacking from current and former employees poses the biggest threat—and is on the rise. The FBI recommends companies take additional security precautions such as changing their passwords more often.

There may be a simpler way: Pay employees more to keep them from becoming disgruntled in the first place.

The rise in employee hacking is just a new wrinkle in the ever-present epidemic of employee theft. Studies have documented the many reasons why employees steal: personal predisposition, economic need, workplace culture, or often a misguided sense of fairness. According to Queens University business professors Liane Greenberg and Julian Barling (PDF), workers often steal when they feel their employment relationship is unfair. They might see stealing as justified because it restores moral order. That attitude is most common when employees consider themselves underpaid, and Greenberg and Barling cite studies that show employee theft increased when pay was cut with no explanation.

More from Bloomberg Business Week by clicking here.

Home Depot data breach triggers fraudulent transactions around the U.S.

Earlier this month, Home Depot confirmed its payment systems were breached and said some 56 million payment cards were likely compromised in a cyberattack at its stores, suggesting the hacking attack at the home improvement chain was larger than last year’s unprecedented breach at Target Corp.

The Home Depot breach has led to fraudulent transactions across the United States, draining cash from customer bank accounts.  Criminals are using stolen card information to buy prepaid cards, electronics and even groceries the Wall Street Journal said.

Home Depot had said customers who shopped at its stores as far back as April were exposed, suggesting the breach extended through the busy summer season.

More from Raw Story by clicking here.

The White House: “Cybersecurity in need of new approach”

Efforts to improve the security of cyberspace have fallen short due to a general inability to grasp the economic and psychological dimensions of the problem, said White House Cybersecurity Coordinator Michael Daniel.

“The bad guys primarily get through vulnerabilities that we know about, and that we even know MichaelDanielhow to fix. From that standpoint, it ought to be relatively simple — just plug the holes,” Daniel said while delivering a keynote Tuesday at the Billington Cybersecurity Conference in Washington.

“We haven’t fully confronted cybersecurity as a human behavior and motivation problem, as opposed to a technical problem,” he continued. “Until we understand the human factors … we will continue to fail at solving this problem.”

A real-time overview of the insider threat landscape

SpectorSoft recently surveyed 355 IT professionals, asking about their experience detecting and preventing insider threats – to explore how organizations are addressing this critical issue and how effective they have been.

Approximately 35 percent of respondents reported they had experienced an insider attack, but the situation is probably worse than they think. With an estimated 75 percent of all insider crimes going unnoticed, it seems likely that all organizations have experienced an insider crime, whether they know it or not.

61 percent said they couldn’t deter such attacks and 59 percent said they were unable even to detect one, leaving them vulnerable to fraud, data breaches, and IP theft.

Get theo whole report from SpectorSoft by clicking here.


Russia Tied to JPMorgan Hacking ?

Russian hackers may have attacked the U.S. financial system in mid-August, infiltrating and stealing data from JPMorgan Chase & Co. (JPM) and at least one other bank, an incident the FBI is investigating as a possible retaliation for government-sponsored sanctions.

The attack resulted in the loss of gigabytes of sensitive data, said the people, who asked not to be identified because the probe is still preliminary. Authorities are investigating whether recent infiltrations of major European banks using a similar vulnerability are also linked to the attack, one of the people said.

In one case, the hackers used a software flaw known as a zero-day vulnerability in one of the banks’ websites. They then plowed through layers of elaborate security to steal the data, a feat security experts said appeared far beyond the capability of ordinary criminal hackers.

“Companies of our size unfortunately experience cyber attacks nearly every day,” Patricia Wexler, a JPMorgan spokeswoman, said in an e-mail.

More (including video) from Bloomberg News by clicking here.

Cyber-intelligence defined…

Jay McAlllister from the SEI Innovation Center: “Cyber-intelligence is the acquisition and analysis of information that is used to identify and track – and predicMacalistert – cyber-capabilities or intentions of people, and enhance decision-making using that intelligence.”


From pod-cast on

Cyber Intelligence Tradecraft Project: Summary of Key Findings

Why one of cybersecurity’s thought leaders uses a pager instead of a smart phone

DanAn interview with Cybersecurity guru Daniel Geer…

“If you give people fine-grained control over what their information is in public, people reveal more. They might say if you give me a lot of control, they’d reveal less — but it doesn’t work that way. People will reveal more if they have more control so to a certain extent is what he’s verifying is sort of my own feeling: If I don’t have control I don’t want to reveal it.  Does the name Alessandro Acquisti mean anything to you?”

More available from the Washington Post by clicking here.


Snowden leaks prompt firms to focus cyber security on insider threats

“There’s a million Snowdens of various degrees at work right now, taking data for profit.


More from the Los Angeles Times by clicking here.