Chief Compliance Officers must embrace new leadership responsibilities

As demands on the compliance function grow more intense, Chief Compliance Officers (CCOs) must proactively embrace new leadership responsibilities for their role and reposition how their function is thought of among stakeholders, according to Gartner. … Continue reading Chief Compliance Officers must embrace new leadership responsibilities

Major threats to cloud infrastructure security include a lack of visibility and inadequate IAM

98% of companies had experienced at least one cloud data breach in the past 18 months compared to 79% last year, according to an IDC survey. Meanwhile, 67% reported three or more such breaches, and 63% said they had sensitive data exposed. Most organiz… Continue reading Major threats to cloud infrastructure security include a lack of visibility and inadequate IAM

An organization’s security posture will benefit from increased coordination

NAVEX Global released key findings from its survey of IT security professionals in the U.S. and U.K. on the collaboration between the IT and risk management functions. Respondents state that IT and cybersecurity risks were broadly considered part of th… Continue reading An organization’s security posture will benefit from increased coordination

Unstructured data still overshared inside and outside organizations

The number of overshared files rose 450 percent compared to the same quarter in 2020, highlighting the significant impact of the pandemic and remote work on data security. Oversharing files increases cybersecurity risk Concentric captured user data in … Continue reading Unstructured data still overshared inside and outside organizations

Consumers neglecting mobile security despite growing number of threats

Over the past year, consumers have adapted to many changes, including the rapid shift towards a digital-first lifestyle. This has led to an emphasis on consumers dependence on mobile devices, as they look to execute nearly all daily activities via devi… Continue reading Consumers neglecting mobile security despite growing number of threats

Navigating the complexity of ransomware negotiations

Most ransomware attacks are opportunistic, and at the end of the day, cybercriminals do not discriminate. Nobody plans to fall victim, but the fact is any company with an internet presence, regardless of size, is at risk. These incidents cause signific… Continue reading Navigating the complexity of ransomware negotiations

USB threats could critically impact business operations

According to a report released by Honeywell, USB threats that can severely impact business operations increased significantly during a disruptive year when the usage of removable media and network connectivity also grew. Data from the report indicates … Continue reading USB threats could critically impact business operations

Many companies believe it is important to protect employee privacy, yet few are effective in doing so

DTEX Systems released a report which revealed a significant workforce privacy gap. The report, conducted by the Ponemon Institute, surveyed a global pool of 1,249 IT and IT security practitioners on their organizations’ approach to securing sensitive i… Continue reading Many companies believe it is important to protect employee privacy, yet few are effective in doing so

Third-party identity risk management, compliance, or both?

Third-party risk management and compliance have traditionally gone hand-in-hand. One is a business requirement, the other a business necessity. So, which comes first? Or rather, which should come first? Third-party identity risk management Before divin… Continue reading Third-party identity risk management, compliance, or both?

How SMBs are dealing with emerging threats

ECI Software Solutions released a report detailing the findings from a survey examining how SMBs are leveraging technology to respond to the various threats from the past year – including cybercrime – while laying the groundwork for not onl… Continue reading How SMBs are dealing with emerging threats