Norway


It’s almost the end of the year. At IT Security Central, we’re in celebration mode, because was a major milestone in the creation of this blog. In six short months, we’ve grown to become a mighty force in the security and insider threats arena. With over 50,000 page views and 300 published , we’ve pushed to extend the pre-existing boundaries of conversation around insider threats and active loss prevention.

As we look back, our audience – YOU – enjoyed and engaged with several top posts on the blog. We’ve highlighted them here.

Cyber Security Predictions for 2018: The Top Experts Speak IT Security Central's Most Popular Posts from 2017 - StockSnap W422L9TH2P 150x150 - IT Security Central’s Most Popular Posts from 2017Cyber Security Predictions for 2018: The Top Experts Speak
Cyber security is an escalating topic that’s receiving a large amount of attention. This is a broad subject. Most commonly, cyber security is mentioned when talking about the latest malware attack, phishing email, social media hack or cloud-based services. As technology improves, new vulnerabilities are discovered and new obstacles challenge security professionals. [READ MORE]

 

 

Top Posts in Data Security

  1. How Often Do Data Breaches Occur? [Infographic]
  2. 6 Impactful 2017 Email Phishing Campaigns, so far
  3. Dangers of Public (wifi) Insiders
  4. How to Manage Third-Party Cyber Risks

 

3 Billion Yahoo Accounts Hacked, But Don't Delete Your Email Yet! IT Security Central's Most Popular Posts from 2017 - pexels photo 93405 150x150 - IT Security Central’s Most Popular Posts from 20173 Billion Yahoo Accounts Hacked, But Don’t Delete Your Email Yet!
You may or may not remember but in August of 2013 Yahoo suffered a major data which was only made public knowledge in December of 2016. At the when the was reported it was only said to have impacted 1 billion accounts. In a latest revelation by now parent company, Verizon, that Yahoo actually failed to protect all 3 billion email accounts under their watch. This is one of the most significant to happen although it doesn’t come close to the Equifax data in types of data stolen. It’s not the number of accounts that makes this significant, but rather that Yahoo email accounts were introductory email accounts held by almost anyone online today. [READ MORE]

Data Breach at UC Health and Healthcare's Ongoing Struggle IT Security Central's Most Popular Posts from 2017 - pexels photo 208556 150x150 - IT Security Central’s Most Popular Posts from 2017Data Breach at UC Health and Healthcare’s Ongoing Struggle
In Cincinnati, Ohio (USA), the Daniel Drake Center for Post-Acute Care of the UC Health system has reported unauthorized access to patient medical records for the past two years by an employee. The data breach was only discovered in June and has impacted an estimated 4,721 patients. They will have a year of complimentary credit monitoring and identity theft protection services from Experian. [READ MORE]

 

 

Top Posts in Insider Threats

  1. The Decline of the Rogue Employee: Utilizing Behavioral Trends
  2. Insider Threat Statistics: 8 Convincing Findings [Infographic]
  3. 4 Different Types of Insider Attacks [Infographic]
  4. Where Hackers Roam: Enter The Darknet

 

The Decline of the Rogue Employee: Utilizing Behavioral Trends IT Security Central's Most Popular Posts from 2017 - pexels photo 230723 150x150 - IT Security Central’s Most Popular Posts from 2017The Decline of the Rogue Employee: Utilizing Behavioral Trends
When we hire employees, we never expect them to go rogue. A rogue employee is a worker that undermines their employer by not complying with company rules and policies. Ultimately, these employees don’t play by the rules, and they hurt the company in some way either through data or financial loss.  [READ MORE]

 

 

Top Trends in Information Security for 2017 and 2018 IT Security Central's Most Popular Posts from 2017 - pexels photo 239919 150x150 - IT Security Central’s Most Popular Posts from 2017Information Security Trends for 2017 and 2018
The computer security world is constantly changing. Everywhere you look, you can see trending new headlines and statements about the latest data breach at HBO, or a respectable healthcare facility losing 0,000s of patient data records. You blink your eyes and the FBI is now involved in a breach investigation, and world leaders are passing policies on data security protection. The reality is criminals are getting ahead of industry leaders at the security game. These are harsh realities that business, IT and security professionals have to work through on a daily basis. [READ MORE]

 

Top Posts in Productivity

  1. The Decline of the Rogue Employee: Utilizing Behavioral Trends
  2. How to Create an Insider Incident Response Plan
  3. Creatures of Habit: How Behavioral Analytics Can Deter Insider Threats

 

What Computer Security Experts Wish You Knew: The Top Experts Speak IT Security Central's Most Popular Posts from 2017 - pexels photo 380769 150x150 - IT Security Central’s Most Popular Posts from 2017What Computer Security Experts Wish You Knew: The Top Experts Speak
When it comes to keeping our information secure, many of us seem to be at a loss. With technology rapidly changing like it does, it’s difficult to stay aware of the latest trends and the latest malware attack. Remember to update those systems. To help, we’ve out to top computer security experts in the field to share their view. We asked them to share two important computer security tips that they wish the general public knew. [READ MORE]

 

 

IT Security Central's Most Popular Posts from 2017 - Teramind Banner 650x108 - IT Security Central’s Most Popular Posts from 2017



Source link

LEAVE A REPLY

Please enter your comment!
Please enter your name here