Total annual costs of a data breach are increasing as the expenses are adding up. Find out more about the state of the 2014 data breach in our newest infographic based on Ponemon's 2014 Cost of a Cyber Crime Study: United States.
> Although the chances of everyone that deals with payment card data being fully in compliance with the newest version of PCI DSS version 3.0 by January 1, 2015 is pretty slim, it’s never too late (unless you’ve been hacked or audited).
The New York Times DealBook sources reported that the JPMorgan Chase breach of the summer that affected 76 million households and 7 million businesses was caused by a single oversight - the lack of two-factor authentication on one of their servers.
The onslaught of low-tech breaches and malware targeting retail organizations has prompted government officials, security experts and the compliance regulators to pay attention as they realize that we need to up our game when it comes to defending against the latest threats to customer payment data.
A Businessweek exclusive report on a sophisticated attack on the Sands Casino is a reminder that weak authentication and password reuse are the gift that keeps giving for hackers.
Every company is comprised of a variety of sensitive data - from HR and payroll handling medical, financial and personally identifiable employee data to your precious intellectual property, which might include proprietary source code. And each of those data types go for a price on the black market, making them valuable to attackers financially as well as for blackmail purposes.
> Large retailers, franchises and small business alike have been affected this year by new vulnerabilities and malware targeting a variety of POS devices, systems and vendors.
What are some of the top concerns of CISOs & CIOs today? According to a 2014 TechAmerica Federal CIO and CISO Survey - improving cyber security, naturally.
At Duo, we strive to be open and transparent about all aspects of our business. We believe it's key to building trust with our customers, and vital to deliver authentic, pragmatic security in an industry full of hype.
The Weekly Ink is the weekly newsletter brought to you by Duo Labs, with curated links of interest in the security world to help educate and entertain on security happenings and culture.
While securing end-user access should be first and foremost, limiting what they have access to is another security precaution often overlooked.
Now you can improve your company’s security posture by easily separating the roles and responsibilities of the different managers of your two-factor solution with our new feature, Administrative Roles.
Banks and retail organizations aren’t the only targets when it comes to stolen financial information - other third-party consultants and business service providers deal with the same type of data, and criminals know it.
Duo Security Recognized as a Visionary in 2014 Magic Quadrant Press and Events / Featured Article
Gartner has named Duo Security a Visionary in its Magic Quadrant for User Authentication, published December 2014.
The Weekly Ink is the weekly newsletter brought to you by Duo Labs, with curated links of interest in the security world to help educate the company - and anyone else who will listen - on security happenings and culture.
With remote access tools, who needs to steal a physical device to get access to payment data? A recent hack of a parking management service provider proves that access security is paramount to keeping customer payment card data safe.
Phishing attacks and unauthorized users are becoming harder to detect as attackers get smarter - they’re targeting Wall Street consulting firms with strategic attacks.