In addition to Weibo, there is also WeChat
Please pay attention
WeChat public account
Shulou
2025-01-19 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Network Security >
Share
Shulou(Shulou.com)06/01 Report--
In recent years, network security issues have emerged one after another, such as blackmail software, personal information disclosure, Internet of things, bitcoin theft, telecommunications fraud, and network espionage between countries.
According to the American online Trust Alliance (OTA), cyber security incidents involving businesses have almost doubled, from about 82000 in 2016 to about 160000 in 2017. The report also says that since a large number of security incidents have never been reported, the total number may actually be as high as 350000.
12 hotels of Continental Hotel Group (IHG) suffered large-scale data leakage
Hotel giant Continental Hotel Group (IHG) has confirmed that the payment systems of 12 of its hotels have been exposed to massive data leaks. Only a month ago, IHG confirmed that there was a problem with credit card payments in some of its hotels, which the company is investigating.
Continental Hotel Group informed customers that customers who paid by credit card in the restaurants or bars of the 12 hotels between August and December 2016 were the victims of the data breach.
The theft of US business giant 52GB database involves tens of millions of US military enterprise information.
March 16, 2017-the 52GB database of US business service giant Dun&Bradstreet has been leaked recently. The database contains more than 33 million records, including government departments and large corporate customers, and there is evidence that it has been sold to marketers.
The database, with a total of about 52 GB, contains 33.8 million unique email addresses and thousands of contact information for corporate employees, and its impact already accounts for a considerable proportion of corporate practitioners in the United States.
143 million users' information stolen by Equifax, an established credit institution.
Equifax, a veteran US consumer credit reporting agency, said on Sept. 7 that its computer system had been compromised and that the personal information of as many as 143 million customers had been compromised.
Equifax is one of the top three credit rating agencies in the United States, and Equifax said the incident took place between mid-May and mid-July. Steal the user's name, date of birth, address, and some even the user's driver's license number from the database.
Enterprises should change from passive to active in dealing with network security
The 20th Ernst & Young Global Information Security Survey report (GISS): recasting Network Security and facing the Network was officially released on March 27th, 2018. The survey results show that the relationship between enterprises has become closer than ever, and this connection makes enterprises face a very high risk of suffering from the network, so it is particularly important to implement appropriate network security measures.
The report believes that the close connection brought by the new technology and the Sina trend not only create great opportunities, but also introduce new risks to enterprises.
This survey interviewed nearly 1200 C-level managers from the largest and most well-known enterprises in the world. The survey shows that 56% of the companies surveyed are adjusting their strategies and plans to take into account the risks posed by cyber threats, or they are planning to re-examine their corporate strategies on that basis. However, 20% of the companies surveyed admitted that they had not fully recognized the need to assess current information security impacts and vulnerabilities.
According to the report, companies should not only focus on resisting the common or easier to deal with, but also consciously adopt nuanced approaches to deal with those advanced and emerging types. In view of the fact that some will inevitably affect the enterprise's defense system, enterprises also need to find and fix loopholes as soon as possible, and improve the effectiveness of response measures.
55% of the companies surveyed in Greater China said that in the next 12 months, data leakage prevention will be a high priority information security task, followed by business continuity / disaster recovery (42%) and privacy protection (39%). All three areas are well above the global level of 11% and 20%. This is closely related to the Cyber Security Law, which came into effect on June 1, 2017.
Beijing Zhongke Henglun Technology Co., Ltd. is a leading manufacturer focusing on identity authentication and next-generation intelligent security authentication. It has enterprise-level dual-factor token authentication, covering hardware tokens, mobile app tokens and SMS tokens; intelligent access integrated security authentication access products; single sign-on products and weak password detection products.
Authentication mode
There are three kinds of CKEY tokens, which are mobile phone tokens, hardware tokens and SMS tokens for users to choose from, and mobile phone tokens and hardware tokens can be changed in 60 seconds according to the time algorithm (can be customized for 30 seconds), without networking, and their logo styles can be customized. SMS token is a kind of authentication system that sends random passwords to the user's mobile phone in the form of SMS, and the user does not need to carry additional authentication devices.
Schematic diagram
Software architecture diagram
Scene
Because CKEY two-factor authentication products are industry-standard dynamic password authentication solutions, they can be directly integrated with hundreds of third-party products and solutions, such as various network devices, security devices (such as * *, firewalls, fortress machines, and operating systems).
Some successful cases
Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.
Views: 0
*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.
Continue with the installation of the previous hadoop.First, install zookooper1. Decompress zookoope
"Every 5-10 years, there's a rare product, a really special, very unusual product that's the most un
© 2024 shulou.com SLNews company. All rights reserved.