Encryption is so critical to enterprise security that it’s almost like air: It’s a necessity, it’s everywhere, and we can’t live without it. On the surface, having encryption everywhere seems like a great idea. However, in many ways the drive to achiev… Continue reading From fragmented encryption chaos to uniform data protection
How do you measure the cost of a company data breach? You could try asking those that have been attacked. The IBM Security Cost of a Data Breach Report 2021 did just that, and the numbers reveal some hard truths. For example, ransomware attacks cost an average of $4.62 million. These costs included escalation, notification, […]
The post The Cost of a Data Breach Goes Beyond the Bottom Line appeared first on Security Intelligence.
A recent industry study analyzed 27,000 on-prem databases across the globe, with surprising findings. In far too many cases, on-premises database security is weak. The good news is that you can manage the risk to cut down on the chance of a data breach. Nearly half (46%) of internal data assets in the study had […]
The post Data Breach Pulse Check: On-Prem Database Security appeared first on Security Intelligence.
In this Help Net Security interview, Bill Tolson, VP of Global Compliance and eDiscovery at Archive360, talks about the importance of cloud compliance and what companies can do meet the requirements when shifitng to the cloud. As organizations accelera… Continue reading Cloud compliance: Falling out of it could spell doom
Government agencies are a prime target for cyber crime. Agencies hold so much diverse data about citizens — from passport information to social care data. In addition, many of them rely on the data security built for their outdated computer systems. So, cyber criminals often view government agencies as an easy mark. More concerning, public-sector […]
Organizations are increasingly adopting multiple cloud technologies to keep up with the scale, speed, and use cases required by modern data teams. 65% of respondents characterized their company as either 100% cloud-based or primarily cloud-based, indic… Continue reading As the move to the cloud accelerates, data privacy and security remain critical
Bring-your-own-device (BYOD) policies were some of the many things that changed when the COVID-19 pandemic hit. A study from Palo Alto Networks by ONR found 60% of companies expanded their BYOD policies to help employees manage the shift to remote work at the beginning of the pandemic. However, the convenience that the new BYOD […]
It has become crucial nowadays, besides having all necessary protections implemented within your system, to also have a disaster recovery plan ready in case an attack occurs. A Disaster-Recovery-as-a-Service (DRaaS) solution comes in handy since itR… Continue reading How do I select a DRaaS solution for my business?
On average, the cost of a data breach rose by 10% from 2020 to 2021. The energy industry ranked fifth in data breach costs, surpassed only by the health care, financial, pharmaceutical and technology verticals, according to the 17th annual Cost of a Data Breach Report. Some energy cybersecurity measures can help reduce the cost […]
The post Report: Cost of a Data Breach in Energy and Utilities appeared first on Security Intelligence.