{"id":4633,"date":"2013-03-29T21:07:00","date_gmt":"2013-03-29T21:07:00","guid":{"rendered":"https:\/\/evssolutions.com\/online-security-threats-grow-in-the-digital-age\/"},"modified":"2013-03-29T21:07:00","modified_gmt":"2013-03-29T21:07:00","slug":"online-security-threats-grow-in-the-digital-age","status":"publish","type":"post","link":"https:\/\/evssolutions.com\/insights\/online-security-threats-grow-in-the-digital-age\/","title":{"rendered":"Online Security Threats Grow in the Digital Age"},"content":{"rendered":"
In a recent interview with Steve
<\/p>\n This reinforces the theory that
[Contributed by EVS Marketing]<\/p>\n<\/p>\n<\/p>\n <\/p>\n","protected":false},"excerpt":{"rendered":" In a recent interview with Steve Durbin of the Information Security Forum, he discusses the current landscape of online security and the risks. Even in the current state of technology and advancement, we are still playing catch up with attackers<\/p>\n","protected":false},"author":40,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[37],"tags":[],"class_list":["post-4633","post","type-post","status-publish","format-standard","hentry","category-security"],"acf":[],"_links":{"self":[{"href":"https:\/\/evssolutions.com\/wp-json\/wp\/v2\/posts\/4633","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/evssolutions.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/evssolutions.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/evssolutions.com\/wp-json\/wp\/v2\/users\/40"}],"replies":[{"embeddable":true,"href":"https:\/\/evssolutions.com\/wp-json\/wp\/v2\/comments?post=4633"}],"version-history":[{"count":0,"href":"https:\/\/evssolutions.com\/wp-json\/wp\/v2\/posts\/4633\/revisions"}],"wp:attachment":[{"href":"https:\/\/evssolutions.com\/wp-json\/wp\/v2\/media?parent=4633"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/evssolutions.com\/wp-json\/wp\/v2\/categories?post=4633"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/evssolutions.com\/wp-json\/wp\/v2\/tags?post=4633"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}
\nDurbin of the Information Security Forum, he discusses the current landscape of
\nonline
\nsecurity and the risks<\/a>. Even in the current state of technology and
\nadvancement, we are still playing catch up with attackers and threats. As
\nDurbin mentions in this interview, cyber attackers are becoming better
\norganized and sophisticated. This means that attackers are easier, cleaner, and
\nhigher in quantity. Online fraud opens the door for attacks that are easier to
\nexecute and hard to detect. That being said, companies are often under the
\nassumption that they will be able to hear, see, or feel an attack when its
\napproaching. This is one of the many contributing factors as to why businesses
\nare lacking the fraud prevention
\nsolutions<\/a> they need in order to protect themselves from online fraud.
\nCompanies need to start taking the initiative to protect themselves and their
\ninformation. One of the most unfortunate risks these days is a companys own
\nemployees at times. Digital information and access is often open to employees
\nand companies do not always ensure a way to deny access to this information if
\nthat person was to leave.<\/p>\n
\ncompanies dont see digital and online information as a vital asset. Many
\nbusinesses still see access to information as a convenience and not as a
\nthreat. While most businesses share company information via some type of
\ndigital\/online mechanism, they rarely realize how vulnerable that can make
\ntheir intellectual property. If internal employees can access this fairly
\neasily, so can attackers. Money, identities, and private information have all
\nmoved online and therefore business owners and consumers should make it
\npriority to protect these assets. Technology is moving ahead a very fast speed,
\nand hackers are moving just as fast, if not faster. Companies now must find a
\nway to protect their online assets without devoting all their time and
\nresources. In many cases, companies have given more power to the consumer and
\ncreated ways for them to access their information from any Internet connection.
\nWhile this may seem like a great value add for the company (and the consumner),
\nit opens up this information for hackers as well. Moving forward, companies must
\nlearn to arm themselves with the proper fraud
\nprevention measures<\/a> to avoid past threats becoming present ones, and
\npresent ones becoming even greater future threats.<\/p>\n<\/p>\n