<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Cybercrime in Member Support</title>
    <link>https://community.isc2.org/t5/Member-Support/Cybercrime/m-p/3406#M314</link>
    <description>&lt;P&gt;See if you can get your hands on the Verizon Breach Report (DBIR) for the current year. Usually a lot of good details in there.&lt;/P&gt;</description>
    <pubDate>Mon, 06 Nov 2017 19:34:55 GMT</pubDate>
    <dc:creator>CISOScott</dc:creator>
    <dc:date>2017-11-06T19:34:55Z</dc:date>
    <item>
      <title>Cybercrime</title>
      <link>https://community.isc2.org/t5/Member-Support/Cybercrime/m-p/3401#M310</link>
      <description>&lt;P&gt;Hi there, I have a few questions. I am doing a research project and I was hoping in getting some more recent information about cybercrime. The information on google.com and bing.com about cybercrime is either 2 years old, or irrelevant to what I am seeking. The questions I have are as follow, What is the the major threat? How can someone prevent these attacks? The reason I ask is because there are many ideas on how to defend yourself online. Some say use VPN, others say use Tor, or proxies. How are people suppose to understand what this means when the information we are given is not in detail. The information that I have heard in detail cost me 20 dollars. Even there some information and ways to prevent aren't allowed. Is cyber security something the government wants to control? I would like to continue on, but I will leave this here and wait for some opinions from you. Thank you.&lt;/P&gt;</description>
      <pubDate>Mon, 09 Oct 2023 08:21:09 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Member-Support/Cybercrime/m-p/3401#M310</guid>
      <dc:creator>Chaotic</dc:creator>
      <dc:date>2023-10-09T08:21:09Z</dc:date>
    </item>
    <item>
      <title>Re: Cybercrime</title>
      <link>https://community.isc2.org/t5/Member-Support/Cybercrime/m-p/3406#M314</link>
      <description>&lt;P&gt;See if you can get your hands on the Verizon Breach Report (DBIR) for the current year. Usually a lot of good details in there.&lt;/P&gt;</description>
      <pubDate>Mon, 06 Nov 2017 19:34:55 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Member-Support/Cybercrime/m-p/3406#M314</guid>
      <dc:creator>CISOScott</dc:creator>
      <dc:date>2017-11-06T19:34:55Z</dc:date>
    </item>
    <item>
      <title>Re: Cybercrime</title>
      <link>https://community.isc2.org/t5/Member-Support/Cybercrime/m-p/3423#M317</link>
      <description>Thank you &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt; I will check this out.</description>
      <pubDate>Tue, 07 Nov 2017 16:14:18 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Member-Support/Cybercrime/m-p/3423#M317</guid>
      <dc:creator>Chaotic</dc:creator>
      <dc:date>2017-11-07T16:14:18Z</dc:date>
    </item>
    <item>
      <title>Re: Cybercrime</title>
      <link>https://community.isc2.org/t5/Member-Support/Cybercrime/m-p/3430#M319</link>
      <description>&lt;P&gt;I would also recommend checking out &lt;A href="https://www.owasp.org" target="_self"&gt;https://www.owasp.org&lt;/A&gt;&amp;nbsp;-- while there review the &lt;A href="https://www.owasp.org/images/f/f8/OWASP_Top_10_-_2013.pdf" target="_self"&gt;OWASP top 10&lt;/A&gt;. There is a plethora of free information on this site that details both the common vulnerabilities as well as means to defend against them. Albeit, many defenses are from a developer perspective.&lt;/P&gt;</description>
      <pubDate>Tue, 07 Nov 2017 19:15:57 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Member-Support/Cybercrime/m-p/3430#M319</guid>
      <dc:creator>jwilsonjx</dc:creator>
      <dc:date>2017-11-07T19:15:57Z</dc:date>
    </item>
    <item>
      <title>Re: Cybercrime</title>
      <link>https://community.isc2.org/t5/Member-Support/Cybercrime/m-p/3434#M322</link>
      <description>&lt;P&gt;Succinctly, ransomware, phishing, and business email compromise continue to be major problems for businesses.&amp;nbsp; Defensively, you need to stick to the basics: patch management, vulnerability scanning, robust backups, etc.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Sources:&lt;/P&gt;&lt;P&gt;There are a number of good industry reports on cybercrime:&lt;/P&gt;&lt;P&gt;(ISC)2 sponsored &lt;A href="http://cert.isc2.org/cybersecurity-spotlight-report-b/" target="_self"&gt;Cybersecurity Trends - 2017 Spotlight Report&lt;/A&gt;&lt;/P&gt;&lt;P&gt;California Attorney General's Office &lt;A href="https://oag.ca.gov/sites/all/files/agweb/pdfs/dbr/2016-data-breach-report.pdf" target="_self"&gt;California Data Breach Report 2016&lt;/A&gt;&lt;/P&gt;&lt;P&gt;PhishMe &lt;A href="https://phishme.com/enterprise-phishing-susceptibility-report" target="_self"&gt;Enterprise Phishing Susceptibility and Resilience Report 2016&lt;/A&gt;&lt;/P&gt;&lt;P&gt;Verizon &lt;A href="http://www.verizonenterprise.com/verizon-insights-lab/dbir/2017/" target="_self"&gt;2017 Data Breach Investigations Report&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Defense:&lt;/P&gt;&lt;P&gt;Stick to the basics.&amp;nbsp; CIS gives you good, high-level objectives.&amp;nbsp; NIST gives you very in-depth options.&lt;/P&gt;&lt;P&gt;CIS &lt;A href="https://www.cisecurity.org/controls/" target="_self"&gt;Critical Security Controls&lt;/A&gt;&lt;/P&gt;&lt;P&gt;NIST &lt;A href="https://csrc.nist.gov/publications/search?requestserieslist=1&amp;amp;requeststatuslist=1,3&amp;amp;requestdisplayoption=brief&amp;amp;itemsperpage=all&amp;amp;requestsortorder=5" target="_self"&gt;Special Publications 800-xx Series&lt;/A&gt;&lt;/P&gt;&lt;P&gt;*800-53 has tons of controls, other 800-xx go in-depth on specific topics.&lt;/P&gt;</description>
      <pubDate>Tue, 07 Nov 2017 20:31:08 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Member-Support/Cybercrime/m-p/3434#M322</guid>
      <dc:creator>Keelan_Stewart</dc:creator>
      <dc:date>2017-11-07T20:31:08Z</dc:date>
    </item>
    <item>
      <title>Re: Cybercrime</title>
      <link>https://community.isc2.org/t5/Member-Support/Cybercrime/m-p/3484#M334</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;What's exactly are you trying to protect from the criminals? Are you thinking about home users, small business, large corporations, governments...? I'd suggest the response to your question will vary depending upon what the target is.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 10 Nov 2017 21:34:13 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Member-Support/Cybercrime/m-p/3484#M334</guid>
      <dc:creator>TonyDS</dc:creator>
      <dc:date>2017-11-10T21:34:13Z</dc:date>
    </item>
  </channel>
</rss>

