How Security Teams and SREs Can Collaborate to Achieve Common Goals

In today’s fast-paced and ever-evolving digital landscape, the collaboration between security teams and Site Reliability Engineers (SREs) is crucial to...

Microsoft recently announced a new policy aimed at holding executives accountable for cybersecurity within their organizations. This move comes as...

In an effort to bolster its cybersecurity measures, Microsoft recently announced a new policy that holds executives accountable for the...

In recent years, cybersecurity has become a top priority for businesses of all sizes as the number of cyber threats...

In a bold move to prioritize cybersecurity within the company, Microsoft recently announced a new policy that holds its executives...

In a world where technology is constantly evolving, the need for cybersecurity experts has never been greater. With cyber attacks...

Unlocked 403 Cybersecurity Podcast is a popular podcast that focuses on cybersecurity and technology. Hosted by industry experts, the podcast...

Uptycs, a leading provider of cloud-native security analytics, has been making waves in the CNAPP (Cloud Native Application Protection Platform)...

Uptycs, a leading provider of cloud-native security analytics, has emerged as a frontrunner in the Container Network Security (CNAPP) market...

Citrix, a leading provider of virtualization, networking, and cloud computing solutions, recently responded to a critical vulnerability in its NetScaler...

Supply chain breaches have become a growing concern for businesses around the world, with a recent report from the Verizon...

Supply chain breaches have become a growing concern for businesses around the world, with a recent report from the Verizon...

Supply chain breaches have become a growing concern for businesses around the world, with a recent report from the Verizon...

The Verizon Data Breach Investigations Report (DBIR) is an annual publication that provides valuable insights into the latest trends and...

The Verizon Data Breach Investigations Report (DBIR) is an annual publication that provides valuable insights into the latest trends and...

Verizon’s Data Breach Investigations Report (DBIR) is a highly anticipated annual publication that provides valuable insights into the current state...

The Verizon Data Breach Investigations Report (DBIR) is an annual publication that provides valuable insights into the current state of...

The Verizon Data Breach Investigations Report (DBIR) is an annual publication that provides valuable insights into the latest trends and...

In today’s digital age, the importance of application security cannot be overstated. With cyber threats becoming increasingly sophisticated, organizations must...

In today’s digital age, the importance of application security cannot be overstated. With cyber threats becoming increasingly sophisticated, organizations must...

LastPass, the popular password management tool, has recently announced that it has successfully completed its corporate split from GoTo, a...

LastPass, the popular password management tool, has recently completed its corporate split from GoTo, a move that has been highly...

Ransom payments have become a common tactic used by cybercriminals to extort money from individuals and organizations. These payments are...

Ransomware attacks have become increasingly prevalent in recent years, with cybercriminals targeting individuals, businesses, and even government organizations. These attacks...

In the world of cybersecurity, ransom payments have become a hotly debated topic. On one hand, paying a ransom may...

A Study Conducted by Identity Theft Resource Center and LexisNexis Risk Solutions on Identity Theft

Identity theft is a growing concern in today’s digital age. With the increasing use of technology and the internet, it has become easier for criminals to steal personal information and use it for fraudulent purposes. In order to better understand the scope of this problem, the Identity Theft Resource Center (ITRC) and LexisNexis Risk Solutions conducted a study on identity theft.

The study, which was released in 2020, analyzed data from over 1,000 data breaches that occurred in the United States in 2019. It found that there were a total of 164.68 million sensitive records exposed in these breaches, which included personal information such as names, addresses, social security numbers, and financial information.

One of the key findings of the study was that the number of data breaches decreased in 2019 compared to the previous year. However, the number of sensitive records exposed increased by 17%. This suggests that while companies may be improving their security measures to prevent breaches, they are still struggling to protect the personal information of their customers.

The study also found that the healthcare industry was the most targeted sector for data breaches, accounting for 51% of all breaches. This is particularly concerning as healthcare records contain some of the most sensitive personal information, including medical histories and social security numbers.

Another important finding was that phishing attacks were the most common method used by cybercriminals to steal personal information. Phishing involves sending fraudulent emails or messages that appear to be from a legitimate source in order to trick individuals into providing their personal information. The study found that 65% of all data breaches involved phishing attacks.

The study also highlighted the importance of taking proactive measures to protect personal information. This includes regularly monitoring credit reports and financial accounts for suspicious activity, using strong and unique passwords for online accounts, and being cautious when sharing personal information online.

Overall, the study conducted by the ITRC and LexisNexis Risk Solutions provides valuable insights into the current state of identity theft in the United States. It underscores the need for individuals and companies to take proactive measures to protect personal information and prevent data breaches. By staying informed and taking steps to protect personal information, we can all work together to combat identity theft and keep our sensitive information safe.