People’s habits around personal and corporate data backup procedures

In this video for Help Net Security, Jon Fielding, Managing Director at Apricorn, talks about a survey of thousands of Twitter users, around their personal and corporate data and backup habits, processes and procedures. The survey found that over 50% o… Continue reading People’s habits around personal and corporate data backup procedures

It’s 2022: Do You Know Where Your Sensitive Data Is?

Looking at recent breaches and scandals, it’s not a mystery why organizations put a premium on good data security and governance practices. Yet, there is one aspect of data security and data governance that proves elusive. Sure, organizations have data activity monitoring (DAM) solutions, extended detection and response (XDR) tools, governance programs run by their […]

The post It’s 2022: Do You Know Where Your Sensitive Data Is? appeared first on Security Intelligence.

Continue reading It’s 2022: Do You Know Where Your Sensitive Data Is?

The challenges of consumer data and PII usage

In this Help Net Security video, Nong Li, CEO at Okera, talks about the challenges of using and managing consumer data and PII. As consumer and PII data get tracked more and more, businesses can drive value and transform how they operate by leveraging … Continue reading The challenges of consumer data and PII usage

57% of people can’t recall if they ever backed up their important documents

Apricorn announced findings from a Twitter poll exploring device data and backup processes ahead of World Backup Day on March 31st. When asked to be honest with their admissions regarding when they last backed up the important files and documents on th… Continue reading 57% of people can’t recall if they ever backed up their important documents

Deploying pseudonymization techniques to protect health data

A report of the European Union Agency for Cybersecurity (ENISA) explores how pseudonymization techniques can help increase the protection of health data. The healthcare sector has highly benefited from technological developments and the digitalization … Continue reading Deploying pseudonymization techniques to protect health data

How hard is it to address Apple’s in-app deletion requirements and implement privacy compliance?

Transcend released the results of its latest survey of technology decision makers, which assessed their readiness for Apple’s in-app deletion requirements for iOS apps that offer account creation. The findings show that 71 percent of companies surveyed… Continue reading How hard is it to address Apple’s in-app deletion requirements and implement privacy compliance?

National Backup Day: Don’t Forget the Basics

This Thursday, March 31 at 9:30 a.m. MT/11:30 a.m. ET, join the National Cybersecurity Center, IBM Security X-Force’s Laurance Dine and Stephanie “Snow” Carruthers, and other security experts, for a World Backup Day discussion on best practices, preparedness and more. Catch the conversation on Twitter. National Backup Day is March 31, which serves as an […]

The post National Backup Day: Don’t Forget the Basics appeared first on Security Intelligence.

Continue reading National Backup Day: Don’t Forget the Basics

The importance of data in the metaverse

A research from Bright Data has highlighted the importance of data in virtual environments such as the metaverse. The survey, conducted by Vanson Bourne, generated insights from 400 IT and technology industry leaders across the US and UK, showed 54% of… Continue reading The importance of data in the metaverse

How to unlock a resilient hybrid work plan

Brivo released a report which reveals that cloud-based access control and high-quality physical security data are paramount when it comes to unlocking a resilient hybrid work plan. The report offers insights into the state of hybrid work and how securi… Continue reading How to unlock a resilient hybrid work plan