August 2, 2018 Edition
View this email in your browser
2FA, Just Do It!
2FA, Just Do It!
The number of credential harvesting breaches that could have been prevented by enabling two-factor authentication (2FA) is staggering. Verizon's 2017 Data Breach Investigation report indicates that 81% of hacking-related breaches leveraged either stolen and/or weak passwords. Yet less than one-third of people use 2FA. 
Employee Theft: 9 Ways to Manage Shrinkage
No retailer likes to think about their employees stealing from them, but it is a reality you might need to deal with. In 2016, the largest retailers in the US recovered in excess of $40 million from over 50,000 apprehended employees, a rise of 10% on the year before. One in every 27 employees was apprehended for theft.
Identity & Access Managements, GRC, SIEM: Tackling Identity Risk as One
To manage identity risk in today's digital environment, it takes three.
Some Myths About Biometrics and Privacy
Privacy is a big concern when it comes to biometrics. And it should be, just as it should be with anything involving personal information and the internet. However, because biometrics uses records of an individual, people get even more nervous about it. A look at the facts shows these concerns are overblown.
Hacker exposes security vulnerability in popular cryptocurrency site
The hack itself wasn’t exactly revolutionary — the hacker simply added a pop-up to the site displaying “1337,” decades’ old hacker lingo for “you’ve been hacked.”
Copyright © 2018 Cybersecurity Journal. All Rights Reserved.
280 Hillside Ave, Needham, MA 02494