Back to WFH: Lessons Learned to Improve Security

As many organizations revert back to WFH strategies amid another COVID-19 spike, is security better this time around? Just as businesses began to welcome back employees, the virus kicked back into gear and some states have reinstated mandatory work-fr… Continue reading Back to WFH: Lessons Learned to Improve Security

CCPA Compliance Can Improve SMBs’ Cybersecurity

The California Consumer Privacy Act (CCPA) went into effect Jan. 1, but its enforcement began July 1. Yet, many organizations have not prepared for CCPA at all, according to a study from data privacy management company Ethyca. More than half of the or… Continue reading CCPA Compliance Can Improve SMBs’ Cybersecurity

COVID-19 Could Catalyze Passwordless Authentication

Passwords have always been a weak link in security, but people are so used to them that getting them to change to a more secure form of authentication has been a difficult task. Could COVID-19 be the catalyst that ends up ushering in passwordless acce… Continue reading COVID-19 Could Catalyze Passwordless Authentication

Securing Data in a Multicloud Environment

The multicloud environment is becoming the standard for businesses, with 93% of organizations using this approach, according to a Flexera 2020 State of the Cloud report. The public cloud services used in the multicloud strategy are gaining in popularity, with Gartner predicting revenue in 2020 will reach more than $266 billion.  “Adoption of next-generation solutions […]

The post Securing Data in a Multicloud Environment appeared first on Security Intelligence.

Continue reading Securing Data in a Multicloud Environment

Threat Intelligence in a Big Data World

Threat intelligence is an important piece of any size organization’s cybersecurity system. But effective threat intelligence often fails is because threat analysis teams aren’t aligning themselves to the business, so they may be looking at the big pic… Continue reading Threat Intelligence in a Big Data World

Device Security: Don’t Count on Users

When it comes to device security, companies need to be more proactive in baking in security to their software development life cycle COVID-19 forced businesses to think about cybersecurity in new ways, which was to be expected, as organizations had to… Continue reading Device Security: Don’t Count on Users

The Security Risks of Contactless Payment

Contactless payment first arrived in the 1990s and is now having its moment. Both companies and consumers are looking for ways to conduct business with as little physical interaction as possible during in-person transactions. We’ve been building to this moment, if you think about it. Organizations have been steadily increasing reliance on digital options and […]

The post The Security Risks of Contactless Payment appeared first on Security Intelligence.

Continue reading The Security Risks of Contactless Payment

The State of WFH Security 3 Months In

The coronavirus-related remote work model has been in place for 90 days in some locations, with expectations that the level of work-from-home (WFH) employees will remain high for the foreseeable future. In fact, according to a new report from Pulse Se… Continue reading The State of WFH Security 3 Months In

COVID-19’s Impact on Data Privacy

COVID-19 has heightened the emphasis on cybersecurity issues. But as people slowly make their way back to the workplace, there is also a shift surrounding the protection of data. Cybersecurity is vital, of course, but questions are rising about data p… Continue reading COVID-19’s Impact on Data Privacy

Protecting Health Data Privacy in the Return to Work

As employees return to their workplaces and consumers begin scheduling appointments with dentists, doctors and salons, new protocols are in place. Temperatures will be taken. There will be questions about health, travel and socialization. Especially i… Continue reading Protecting Health Data Privacy in the Return to Work