How to create awareness and mitigate data loss incidents

Nearly 60% of organizations experienced data loss or exfiltration caused by an employee mistake on email in the last 12 months. The most common types of confidential and sensitive information lost or intentionally stolen include: customer information, … Continue reading How to create awareness and mitigate data loss incidents

Paying the ransom is not a good recovery strategy

Businesses are losing the battle when it comes to defending against ransomware attacks, according to a Veeam report, which found that 72% of organizations had partial or complete attacks on their backup repositories, dramatically impacting the ability … Continue reading Paying the ransom is not a good recovery strategy

Email is the riskiest channel for data security

A research from Tessian and the Ponemon Institute reveals that nearly 60% of organizations experienced data loss or exfiltration caused by an employee mistake on email in the last 12 months. Email was revealed as the riskiest channel for data loss in o… Continue reading Email is the riskiest channel for data security

The Great Resignation meets the Great Exfiltration: How to securely offboard security personnel

“The Great Resignation” is a phenomenon that has greatly impacted how we work. As of August 2021, 65% of people in the United States were looking for a new job and 25% of them actually quit. With tens of millions of people shuffling around the workforc… Continue reading The Great Resignation meets the Great Exfiltration: How to securely offboard security personnel

Organizations neglecting Microsoft 365 cybersecurity features

Nearly half of organizations are not using the full set of features and applications available in Microsoft 365, a research from Ensono reveals. Most notably, many enterprises are neglecting the cybersecurity features available in the platform, leaving… Continue reading Organizations neglecting Microsoft 365 cybersecurity features

How to Prevent Data Leakage in Microsoft Teams with Data Loss Prevention

As more employees shift to working remotely, it is more important than ever that organizations prioritize protecting their business-critical and sensitive data across apps, endpoints, and cloud services. Employees will be accessing, sharing, creating, and storing data in new ways than before, meaning the need to make sure this is protected and compliant is more […] Continue reading How to Prevent Data Leakage in Microsoft Teams with Data Loss Prevention

Enterprise data loss prevention market to reach $6.265 billion by 2026

The global enterprise data loss prevention market is projected to grow at a CAGR of 21.03% to reach $6.265 billion by 2026, from $1.647 billion in 2019, according to ResearchAndMarkets. The enterprise data loss prevention market is highly driven by the… Continue reading Enterprise data loss prevention market to reach $6.265 billion by 2026

Implications of strengthening the cybersecurity of small business in America

On November 2, 2021, the House of Representatives passed two bills with the goal of strengthening the cybersecurity of small businesses in America. The first bill, the Small Business Administration (SBA) Cyber Awareness Act, was unanimously approved to… Continue reading Implications of strengthening the cybersecurity of small business in America

Top 5 cybersecurity considerations for file uploads of vaccination records

As vaccination mandates become more common, immunization records are increasingly required across the world. Organizations are turning to the digital space to upload images of COVID-19 record cards as electronic proof of vaccination. Having a web appli… Continue reading Top 5 cybersecurity considerations for file uploads of vaccination records

Eliminate cyber friction with smarter technology

In modern organizations, it’s natural for there to be some friction between cybersecurity teams and employees. While the cybersecurity teams defends the organization’s attack surface with a defense-in-depth combination of tools, processes, … Continue reading Eliminate cyber friction with smarter technology