News Stay informed about the latest enterprise technology news and product updates.

500 million stolen financial records in the last 12 months

Week after week a new breach is reported, followed by more advice on how best to protect yourself. But as this week’s news roundup from SearchCIO’s Fran Sales shows, the degree to which companies are unprepared for cybercrime is downright scary. She recounts the story of one organization that didn’t know it had been hacked until the FBI was at its door with bad news: The company’s network defenses, such as they were, had been breached and intellectual property stolen.

CIOs should take it as a good sign that the Feds came calling. When you read about what Sales heard from security experts this week at a cybersecurity conference in Boston, it’s clear that fighting cybercrime will take a concerted, coordinated effort by both the private sector and the government. These criminal networks are organized, specialized and highly efficient. Staples realized this when it sought the help of the FBI this week in response to a possible breach of its systems. Experts strongly suggest other companies should follow suit.

In other news this week, robots may be able to help in the fight to contain Ebola, Apple’s quarterly earnings report is out (and it’s not too shabby), IBM is selling its unprofitable chip manufacturing business, and more in this week’s Searchlight.

cyber security

Join the conversation

3 comments

Send me notifications when other members comment.

Please create a username to comment.

good
Cancel
this is for test
Cancel
Can you trust this kind of tool will not connect to the Big Boss - US government?
Cancel

-ADS BY GOOGLE

SearchCompliance

SearchHealthIT

SearchCloudComputing

SearchMobileComputing

SearchDataCenter

  • How do I size a UPS unit?

    Your data center UPS sizing needs are dependent on a variety of factors. Develop configurations and determine the estimated UPS ...

  • How to enhance FTP server security

    If you still use FTP servers in your organization, use IP address whitelists, login restrictions and data encryption -- and just ...

  • 3 ways to approach cloud bursting

    With different cloud bursting techniques and tools from Amazon, Zerto, VMware and Oracle, admins can bolster cloud connections ...

Close