Hackers use e-mail, social media and a working knowledge of financial company operations to infiltrate networks, Stender says, adding that they don’t have to target just large institutions for the undertaking to be highly profitable.

Criminals have also been known to hold onto information for months or years before using it, he added. The speed with which transactions take place also benefits criminals, resulting in fraudulent transactions before unwitting companies are even aware of the breaches.
 

First « 1 2 » Next