article thumbnail

Business ID Theft Soars Amid COVID Closures

Krebs on Security

Identity thieves who specialize in running up unauthorized lines of credit in the names of small businesses are having a field day with all of the closures and economic uncertainty wrought by the COVID-19 pandemic, KrebsOnSecurity has learned. But the same crime can be far more costly and damaging when thieves target small businesses.

article thumbnail

Why smart meters will be essential to our sustainable future

CyberSecurity Insiders

As highlighted in the recent COP26 conference, human activity is causing unprecedented and potentially irreversible change to our environment, which is being driven by our production of harmful emissions and excessive energy consumption. But smart meters aren’t just saving energy in the homes of consumers.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

News alert: Beazley reports on how AI, new tech distract businesses as cyber risk intensifies

The Last Watchdog

IP theft has also become the cyber and technology risk for which businesses across the world feel least prepared, with more than one in four businesses (26%) reporting they feel ill-equipped to mitigate this risk.

article thumbnail

MY TAKE: Why consumers are destined to play a big role in securing the Internet of Things

The Last Watchdog

This will be led by the manufacturing, consumer, transportation and utilities sectors. One recent study demonstrated how, by analyzing readings from a smart home, such as energy consumption, carbon monoxide and carbon dioxide levels, and humidity changes, it was possible to triangulate what someone had for dinner. Talk more soon.

Internet 189
article thumbnail

Every month should be Cybersecurity Awareness Month!

CyberSecurity Insiders

Industries such as healthcare and energy and utilities are susceptible and arguably the most vulnerable to ransomware or other cybersecurity incidents. Small businesses, which previously felt they were too small to be of interest to criminals, are finding that they too are a target.

article thumbnail

Non-profit Global Business Alliance launches supply chain subsidiary

SC Magazine

A lot gets made about the difficulty small businesses have in the new spate of federal and military contractor cybersecurity regulations, and for good reason : Small businesses are less likely to have the resources, experience and infrastructure to engage with rigorous cybersecurity requirements.

article thumbnail

CSTA Turns 400 – Proof That Technology Integrations Is Exactly What You Are Looking For

Cisco Security

With the addition of Kenna Security into our program we now have over 250 technology partners and over 400 integrations for our mutual customers to utilize. Data is available on a number of RF protocols including Cellular, Bluetooth, Bluetooth Low Energy, Wi-Fi, and IEEE 802.15.4. Read more here. Read more here. Read more here.