5 Data Security Challenges and How to Solve Them

  Nearly two-thirds of the global population will have internet access by next year, according to Cisco’s Annual Internet Report (2018-2023) White Paper. There will be 5.3 billion total internet users (66% of the global population) by 2023, up from 3.9 billion (51% of the global population) in 2018. With this growth in internet usage, […]

The post 5 Data Security Challenges and How to Solve Them appeared first on Security Intelligence.

Continue reading 5 Data Security Challenges and How to Solve Them

It’s 2022: Do You Know Where Your Sensitive Data Is?

Looking at recent breaches and scandals, it’s not a mystery why organizations put a premium on good data security and governance practices. Yet, there is one aspect of data security and data governance that proves elusive. Sure, organizations have data activity monitoring (DAM) solutions, extended detection and response (XDR) tools, governance programs run by their […]

The post It’s 2022: Do You Know Where Your Sensitive Data Is? appeared first on Security Intelligence.

Continue reading It’s 2022: Do You Know Where Your Sensitive Data Is?

Data Protection: What Needs to Be Protected?

Where is your organization’s data? From global data centers to PCs to mobile apps, data is strewn all over the place. So how do you protect it all?  You can’t encrypt everything, right? It’s too expensive and time-consuming. Even the most stringent regulations don’t demand that level of data protection. For example, GDPR focuses primarily […]

The post Data Protection: What Needs to Be Protected? appeared first on Security Intelligence.

Continue reading Data Protection: What Needs to Be Protected?

Why We Need To Beat ‘Breach Fatigue’ — At Work and at Home

Data breaches come at such a fast pace that the public doesn’t seem to pay attention to the latest incidents, or they’re practically forgotten in a week — just in time for the next breach to make headlines. Instead of cries for better personal data protection, however, consumers seem less concerned even as more companies […]

The post Why We Need To Beat ‘Breach Fatigue’ — At Work and at Home appeared first on Security Intelligence.

Continue reading Why We Need To Beat ‘Breach Fatigue’ — At Work and at Home

Data Security: Defending Against the Cache Poisoning Vulnerability

Do you trust your cache? To meet the demands of the end-users and speed up content delivery, content caching by web servers and content delivery networks (CDN) has become a vital part of the modern web. To explain how this can create vulnerabilities when it comes to data security requires first asking another question. Namely, […]

The post Data Security: Defending Against the Cache Poisoning Vulnerability appeared first on Security Intelligence.

Continue reading Data Security: Defending Against the Cache Poisoning Vulnerability

How to Cut Down on Data Breach Stress and Fatigue

If you’re tired of hearing the words ‘data breach’, you’re not alone. It’s looking like 2021 might end up becoming the year with the most ransomware attacks on record. In August, SonicWall reported that the global ransomware attack volume had increased 151% during the first six months of the year compared to H1 2020. The […]

The post How to Cut Down on Data Breach Stress and Fatigue appeared first on Security Intelligence.

Continue reading How to Cut Down on Data Breach Stress and Fatigue

How Do You Plan to Celebrate National Computer Security Day?

In October 2022, the world marked the 19th Cybersecurity Awareness Month. October might be over, but employers can still talk about awareness of digital threats. We all have another chance before then: National Computer Security Day. The History of National Computer Security Day The origins of National Computer Security Day trace back to 1988 and […]

The post How Do You Plan to Celebrate National Computer Security Day? appeared first on Security Intelligence.

Continue reading How Do You Plan to Celebrate National Computer Security Day?

What the SEC Requires From Businesses After a Data Breach

Consumers have become wary of data breaches and the decreased safety of their personal information. However, the cost of a data breach is no longer only a matter of money and your company’s good name. There is now a third critical reason to pay attention: the U.S. Securities and Exchange Commission — more commonly referred […]

The post What the SEC Requires From Businesses After a Data Breach appeared first on Security Intelligence.

Continue reading What the SEC Requires From Businesses After a Data Breach

The Cost of a Data Breach Goes Beyond the Bottom Line

How do you measure the cost of a company data breach? You could try asking those that have been attacked. The IBM Security Cost of a Data Breach Report 2021 did just that, and the numbers reveal some hard truths.  For example, ransomware attacks cost an average of $4.62 million. These costs included escalation, notification, […]

The post The Cost of a Data Breach Goes Beyond the Bottom Line appeared first on Security Intelligence.

Continue reading The Cost of a Data Breach Goes Beyond the Bottom Line

Data Breach Pulse Check: On-Prem Database Security

A recent industry study analyzed 27,000 on-prem databases across the globe, with surprising findings. In far too many cases, on-premises database security is weak. The good news is that you can manage the risk to cut down on the chance of a data breach.  Nearly half (46%) of internal data assets in the study had […]

The post Data Breach Pulse Check: On-Prem Database Security appeared first on Security Intelligence.

Continue reading Data Breach Pulse Check: On-Prem Database Security