Profile cover photo
Profile photo
CHIPS Technology Group
3 followers -
Providing Over 20 Years of Excellence!
Providing Over 20 Years of Excellence!

3 followers
About
Posts

Post has attachment
CHIPS' CTO, David Tan, was recently featured in a Long Island Business News article regarding cybersecurity in business. Check it out!

Post has attachment
Criminals are hijacking consumers' coffee accounts, draining the stored value of their cards, and then using Starbucks' auto-reload function to hack consumers' associated debit and credit cards.

The scheme is part of a new fraud trend, said Gartner security analyst Avivah Litan: Credit card hackers are targeting third-party firms that create alternative payment systems and attacking them, finding they are often easier to hack than financial institutions.

"Fraud is moving away from banks into big e-commerce companies," she said. "Criminals are learning how to turn rewards programs, points and prepaid cards into cash." - http://ow.ly/MWSk8
Photo

Post has attachment
Check out our new collection on Information Security!

Post has attachment
The breadth and depth of the data breaches seen by the world in 2014 was shocking – spanning major banks, e-commerce giants, healthcare giants, casinos and others, exposing hundreds of millions of usernames, passwords and credit card details. 2015 will be no different, and businesses and consumers need to be prepared for continued changes in the cyber-crime landscape...

Post has attachment
I'm sure you've heard it before, the saying that "it's not a matter of if, but a matter of when" in regards to data breaches on companies. However, what are you supposed to do if someone does break in to your servers and maliciously intends to corrupt your company's documents and files?

Here are 7 actions you can take to minimize damage if cyber criminals do get in:

Post has attachment
Need assistance in securing your Facebook account privacy? Far too often people post what seem to be meaningless updates that can give cyber-criminals access into your personal life...http://ow.ly/Mxyeg
Photo

Post has attachment
The campaign takes the form of spammed out messages impersonating a job seeker who's sending in a resume. The "resume" is actually an executable program that can wreak havoc on your business... http://ow.ly/Mxwms
Photo

Post has attachment
If you mention the term "data breach" to any CEO or IT Professional, you better be prepared to administer some intense CPR. But did you ever wonder WHY? Why is that data so valuable? What happens to that data after a breach has occurred? and, why is it so hard to retrieve?

Post has attachment
"Malware Peddlers" are once again trying to trick business end-users into downloading malicious software by sending out fake emails impersonating domain administrators...

Post has attachment
As I’m sure you’ve heard, Radio Shack recently filed for bankruptcy. As part of the company liquidation, they are putting a list of assets for sale. A quick look over that list is extremely interesting. Anyone who has read anything we’ve ever written about data or security has probably noticed a very common theme. I think in today’s day and age, your data is your most valuable asset. Well Radio Shack is going to a whole new extreme to prove my point.
Wait while more posts are being loaded