Preparing financial institutions for the next generation of cyber threats

In this Help Net Security interview, James Mirfin, SVP and Head of Risk and Identity Solutions at Visa, discusses key priorities for leaders combating fraud, the next-generation threats institutions must prepare for, and the role of collaboration betwe… Continue reading Preparing financial institutions for the next generation of cyber threats

How secure are green data centers? Consider these 5 trends

As organizations increasingly measure environmental impact towards their sustainability goals, many are focusing on their data centers. KPMG found that the majority of the top 100 companies measure and report on their sustainability efforts. Because data centers consume a large amount of energy, Gartner predicts that by 2027, three in four organizations will have implemented […]

The post How secure are green data centers? Consider these 5 trends appeared first on Security Intelligence.

Continue reading How secure are green data centers? Consider these 5 trends

Why maintaining data cleanliness is essential to cybersecurity

Data, in all its shapes and forms, is one of the most critical assets a business possesses. Not only does it provide organizations with critical information regarding their systems and processes, but it also fuels growth and enables better decision-making on all levels. However, like any other piece of company equipment, data can degrade over […]

The post Why maintaining data cleanliness is essential to cybersecurity appeared first on Security Intelligence.

Continue reading Why maintaining data cleanliness is essential to cybersecurity

EU takes decisive action on healthcare cybersecurity

The Commission has presented an EU action plan aimed at strengthening the cybersecurity of hospitals and healthcare providers. The initiative is an essential step in shielding the healthcare sector from cyber threats. Digitalization is revolutionizing … Continue reading EU takes decisive action on healthcare cybersecurity

Router reality check: 86% of default passwords have never been changed

Misconfigurations remain a popular compromise point — and routers are leading the way. According to recent survey data, 86% of respondents have never changed their router admin password, and 52% have never adjusted any factory settings. This puts attackers in the perfect position to compromise enterprise networks. Why put the time and effort into creating phishing […]

The post Router reality check: 86% of default passwords have never been changed appeared first on Security Intelligence.

Continue reading Router reality check: 86% of default passwords have never been changed

Preparing for the future of data privacy

The focus on data privacy started to quickly shift beyond compliance in recent years and is expected to move even faster in the near future. Not surprisingly, the Thomson Reuters Risk & Compliance Survey Report found that 82% of respondents cited data and cybersecurity concerns as their organization’s greatest risk. However, the majority of organizations […]

The post Preparing for the future of data privacy appeared first on Security Intelligence.

Continue reading Preparing for the future of data privacy

How to craft a comprehensive data cleanliness policy

Practicing good data hygiene is critical for today’s businesses. With everything from operational efficiency to cybersecurity readiness relying on the integrity of stored data, having confidence in your organization’s data cleanliness policy is essential. But what does this involve, and how can you ensure your data cleanliness policy checks the right boxes? Luckily, there are […]

The post How to craft a comprehensive data cleanliness policy appeared first on Security Intelligence.

Continue reading How to craft a comprehensive data cleanliness policy

Key steps to scaling automated compliance while maintaining security

In this Help Net Security interview, Vivek Agarwal, Privacy Program Manager at Meta Platforms, shares insights on strategies for reducing time to market, improving vendor onboarding, and updating privacy requirements to ensure compliance across third-p… Continue reading Key steps to scaling automated compliance while maintaining security

Third-party access: The overlooked risk to your data protection plan

A recent IBM Cost of a Data Breach report reveals a startling statistic: Only 42% of companies discover breaches through their own security teams. This highlights a significant blind spot, especially when it comes to external partners and vendors. The financial stakes are steep. On average, a data breach affecting multiple environments costs a whopping […]

The post Third-party access: The overlooked risk to your data protection plan appeared first on Security Intelligence.

Continue reading Third-party access: The overlooked risk to your data protection plan