How to craft a comprehensive data cleanliness policy

Practicing good data hygiene is critical for today’s businesses. With everything from operational efficiency to cybersecurity readiness relying on the integrity of stored data, having confidence in your organization’s data cleanliness policy is essential. But what does this involve, and how can you ensure your data cleanliness policy checks the right boxes? Luckily, there are […]

The post How to craft a comprehensive data cleanliness policy appeared first on Security Intelligence.

Continue reading How to craft a comprehensive data cleanliness policy

Key steps to scaling automated compliance while maintaining security

In this Help Net Security interview, Vivek Agarwal, Privacy Program Manager at Meta Platforms, shares insights on strategies for reducing time to market, improving vendor onboarding, and updating privacy requirements to ensure compliance across third-p… Continue reading Key steps to scaling automated compliance while maintaining security

Third-party access: The overlooked risk to your data protection plan

A recent IBM Cost of a Data Breach report reveals a startling statistic: Only 42% of companies discover breaches through their own security teams. This highlights a significant blind spot, especially when it comes to external partners and vendors. The financial stakes are steep. On average, a data breach affecting multiple environments costs a whopping […]

The post Third-party access: The overlooked risk to your data protection plan appeared first on Security Intelligence.

Continue reading Third-party access: The overlooked risk to your data protection plan

Microsoft announces new and improved Windows 11 security features

Microsoft has implemented some and is working on delivering several other security-related features and improvements for Windows 11. Administrator protection will allow users to make system changes on their PCs without having administrator rights (that… Continue reading Microsoft announces new and improved Windows 11 security features

Communication platforms play a major role in data breach risks

Every online activity or task brings at least some level of cybersecurity risk, but some have more risk than others. Kiteworks Sensitive Content Communications Report found that this is especially true when it comes to using communication tools. When it comes to cybersecurity, communicating means more than just talking to another person; it includes any […]

The post Communication platforms play a major role in data breach risks appeared first on Security Intelligence.

Continue reading Communication platforms play a major role in data breach risks

SpyAgent malware targets crypto wallets by stealing screenshots

A new Android malware strain known as SpyAgent is making the rounds — and stealing screenshots as it goes. Using optical character recognition (OCR) technology, the malware is after cryptocurrency recovery phrases often stored in screenshots on user devices. Here’s how to dodge the bullet. Attackers shooting their (screen) shot Attacks start — as always […]

The post SpyAgent malware targets crypto wallets by stealing screenshots appeared first on Security Intelligence.

Continue reading SpyAgent malware targets crypto wallets by stealing screenshots

Exploring DORA: How to manage ICT incidents and minimize cyber threat risks

As cybersecurity breaches continue to rise globally, institutions handling sensitive information are particularly vulnerable. In 2024, the average cost of a data breach in the financial sector reached $6.08 million, making it the second hardest hit after healthcare, according to IBM’s 2024 Cost of a Data Breach report. This underscores the need for robust IT […]

The post Exploring DORA: How to manage ICT incidents and minimize cyber threat risks appeared first on Security Intelligence.

Continue reading Exploring DORA: How to manage ICT incidents and minimize cyber threat risks

Consumer privacy risks of data aggregation: What should organizations do?

In September 2024, the Federal Trade Commission (FTC) released an eye-opening report that digs into the data habits of nine major tech giants, including Amazon (Twitch), ByteDance (TikTok), Discord, Facebook, Reddit, Snap, Twitter, WhatsApp, and YouTub… Continue reading Consumer privacy risks of data aggregation: What should organizations do?

Skills shortage directly tied to financial loss in data breaches

The cybersecurity skills gap continues to widen, with serious consequences for organizations worldwide. According to IBM’s 2024 Cost Of A Data Breach Report, more than half of breached organizations now face severe security staffing shortages, a whopping 26.2% increase from the previous year. And that’s expensive. This skills deficit adds an average of $1.76 million in […]

The post Skills shortage directly tied to financial loss in data breaches appeared first on Security Intelligence.

Continue reading Skills shortage directly tied to financial loss in data breaches

Strong privacy laws boost confidence in sharing information with AI

53% of consumers report being aware of their national privacy laws, a 17-percentage point increase compared to 2019, according to Cisco. Informed consumers are also much more likely to feel their data is protected (81%) compared to those who are unawar… Continue reading Strong privacy laws boost confidence in sharing information with AI