When employees leave, is your data walking out the door?

In the second quarter of 2021, American workers began resigning from their jobs at a historic rate. The “Great Resignation”, as it’s since been dubbed, has seen the U.S. set monthly records for the number of workers leaving their jobs three times this … Continue reading When employees leave, is your data walking out the door?

Governance and data privacy: What to expect in 2022?

Okera revealed its top industry predictions and trends expected to emerge in data privacy and governance for 2022 according to the company’s CEO, Nick Halsey; CTO, Nong Li; and Okera Advisory Board member and recent Gartner VP analyst, Sanjeev Mohan. H… Continue reading Governance and data privacy: What to expect in 2022?

How familiar are consumers with data protection best practices?

With data breaches on the rise along with consumer demand for privacy and control over their own data, governments have in turn adopted new data protection regulations — and businesses are feeling the pressure. Now, a consumer research from Ground Labs… Continue reading How familiar are consumers with data protection best practices?

Adoption of private 5G networks accelerates, as organizations look to improve security and speed

There’s a significant interest in private 5G networks, with 90% of executives expecting that private 5G will become the standard network choice, according to an Economist Impact survey. Where is private 5G being deployed? The research shows that … Continue reading Adoption of private 5G networks accelerates, as organizations look to improve security and speed

Starting From Scratch: How to Build a Small Business Cybersecurity Program

When you run a small business, outsourcing for services like IT and security makes a lot of sense. While you might not have the budget for a full-time professional on staff to do these jobs, you still need the services. However, while it might be helpful to have a managed service provider handle your software […]

The post Starting From Scratch: How to Build a Small Business Cybersecurity Program appeared first on Security Intelligence.

Continue reading Starting From Scratch: How to Build a Small Business Cybersecurity Program

7 Holiday Cybersecurity Tips to Try Before The Year Ends

The holiday rush is upon us, and so is the risk of cyberattack. Threat actors often get to work during the holidays. IT staff is heading out for vacation, and everyone is in a hurry. This means we might skimp on security. Still, there are some holiday cybersecurity tips that will help make the season […]

The post 7 Holiday Cybersecurity Tips to Try Before The Year Ends appeared first on Security Intelligence.

Continue reading 7 Holiday Cybersecurity Tips to Try Before The Year Ends

How proactive are companies when managing data?

33 percent of U.S. companies are not proactively putting in place systems to monitor, warehouse and protect their internal data, despite growing international regulations mandating it and heightened legal risks associated with data theft, a BigID and S… Continue reading How proactive are companies when managing data?

Data Security: Defending Against the Cache Poisoning Vulnerability

Do you trust your cache? To meet the demands of the end-users and speed up content delivery, content caching by web servers and content delivery networks (CDN) has become a vital part of the modern web. To explain how this can create vulnerabilities when it comes to data security requires first asking another question. Namely, […]

The post Data Security: Defending Against the Cache Poisoning Vulnerability appeared first on Security Intelligence.

Continue reading Data Security: Defending Against the Cache Poisoning Vulnerability

How Do You Plan to Celebrate National Computer Security Day?

In October 2022, the world marked the 19th Cybersecurity Awareness Month. October might be over, but employers can still talk about awareness of digital threats. We all have another chance before then: National Computer Security Day. The History of National Computer Security Day The origins of National Computer Security Day trace back to 1988 and […]

The post How Do You Plan to Celebrate National Computer Security Day? appeared first on Security Intelligence.

Continue reading How Do You Plan to Celebrate National Computer Security Day?

What the SEC Requires From Businesses After a Data Breach

Consumers have become wary of data breaches and the decreased safety of their personal information. However, the cost of a data breach is no longer only a matter of money and your company’s good name. There is now a third critical reason to pay attention: the U.S. Securities and Exchange Commission — more commonly referred […]

The post What the SEC Requires From Businesses After a Data Breach appeared first on Security Intelligence.

Continue reading What the SEC Requires From Businesses After a Data Breach