From fragmented encryption chaos to uniform data protection

Encryption is so critical to enterprise security that it’s almost like air: It’s a necessity, it’s everywhere, and we can’t live without it. On the surface, having encryption everywhere seems like a great idea. However, in many ways the drive to achiev… Continue reading From fragmented encryption chaos to uniform data protection

Products used by children are not nearly as privacy-protecting as they should be

Common Sense Media released a report examining kids’ privacy trends and practices of hundreds of popular technology companies and products over the last five years. The report is the culmination of evaluating privacy policy data from 200 of the m… Continue reading Products used by children are not nearly as privacy-protecting as they should be

The Cost of a Data Breach Goes Beyond the Bottom Line

How do you measure the cost of a company data breach? You could try asking those that have been attacked. The IBM Security Cost of a Data Breach Report 2021 did just that, and the numbers reveal some hard truths.  For example, ransomware attacks cost an average of $4.62 million. These costs included escalation, notification, […]

The post The Cost of a Data Breach Goes Beyond the Bottom Line appeared first on Security Intelligence.

Continue reading The Cost of a Data Breach Goes Beyond the Bottom Line

Data Breach Pulse Check: On-Prem Database Security

A recent industry study analyzed 27,000 on-prem databases across the globe, with surprising findings. In far too many cases, on-premises database security is weak. The good news is that you can manage the risk to cut down on the chance of a data breach.  Nearly half (46%) of internal data assets in the study had […]

The post Data Breach Pulse Check: On-Prem Database Security appeared first on Security Intelligence.

Continue reading Data Breach Pulse Check: On-Prem Database Security

Cloud compliance: Falling out of it could spell doom

In this Help Net Security interview, Bill Tolson, VP of Global Compliance and eDiscovery at Archive360, talks about the importance of cloud compliance and what companies can do meet the requirements when shifitng to the cloud. As organizations accelera… Continue reading Cloud compliance: Falling out of it could spell doom

Roundup: Government Data Security Threats in 2021

Government agencies are a prime target for cyber crime. Agencies hold so much diverse data about citizens — from passport information to social care data. In addition, many of them rely on the data security built for their outdated computer systems. So, cyber criminals often view government agencies as an easy mark. More concerning, public-sector […]

The post Roundup: Government Data Security Threats in 2021 appeared first on Security Intelligence.

Continue reading Roundup: Government Data Security Threats in 2021

As the move to the cloud accelerates, data privacy and security remain critical

Organizations are increasingly adopting multiple cloud technologies to keep up with the scale, speed, and use cases required by modern data teams. 65% of respondents characterized their company as either 100% cloud-based or primarily cloud-based, indic… Continue reading As the move to the cloud accelerates, data privacy and security remain critical

Designing a BYOD Approach for the Future

  Bring-your-own-device (BYOD) policies were some of the many things that changed when the COVID-19 pandemic hit. A study from Palo Alto Networks by ONR found 60% of companies expanded their BYOD policies to help employees manage the shift to remote work at the beginning of the pandemic. However, the convenience that the new BYOD […]

The post Designing a BYOD Approach for the Future appeared first on Security Intelligence.

Continue reading Designing a BYOD Approach for the Future

How do I select a DRaaS solution for my business?

It has become crucial nowadays, besides having all necessary protections implemented within your system, to also have a disaster recovery plan ready in case an attack occurs. A Disaster-Recovery-as-a-Service (DRaaS) solution comes in handy since it&#82… Continue reading How do I select a DRaaS solution for my business?

Report: Cost of a Data Breach in Energy and Utilities

On average, the cost of a data breach rose by 10% from 2020 to 2021. The energy industry ranked fifth in data breach costs, surpassed only by the health care, financial, pharmaceutical and technology verticals, according to the 17th annual Cost of a Data Breach Report. Some energy cybersecurity measures can help reduce the cost […]

The post Report: Cost of a Data Breach in Energy and Utilities appeared first on Security Intelligence.

Continue reading Report: Cost of a Data Breach in Energy and Utilities