What Does The Great Resignation Mean for Data Security?

You may not realize it yet, but we’re living through the latest zeitgeist. It’s the Great Resignation. You may have heard it being tossed around the media or witnessed it firsthand, or even been a part yourself. Either way, it’s happening across the United States. And it affects data security as much as it affects […]

The post What Does The Great Resignation Mean for Data Security? appeared first on Security Intelligence.

Continue reading What Does The Great Resignation Mean for Data Security?

How businesses use data might not be popular with the public

A KPMG survey reveals a deep disconnect between corporate data practices and the general population’s expectations around transparency and data privacy. As companies collect more personal data, survey respondents are increasingly concerned about how th… Continue reading How businesses use data might not be popular with the public

Demand for data is growing, but so are data supply chain challenges

Data suppliers are unable to efficiently deliver relevant data to a growing number of data consumers, according to a 451 Research survey. 55% of those surveyed report that data is often stale or out-of-date by the time it is consumed or analyzed. Lack … Continue reading Demand for data is growing, but so are data supply chain challenges

Reliance on third party workers making companies more vulnerable to cyberattacks

A survey from SecZetta revealed 83% of respondents agree that because organizations increasingly rely on contractors, freelancers, and other third party workers, their data systems have become more vulnerable to cyberattacks. Further, 88% of people say… Continue reading Reliance on third party workers making companies more vulnerable to cyberattacks

SMEs awareness of GDPR is high, but few adhere to its legal requirements

85 percent of the small- to medium-sized enterprises (SMEs) in the UK are familiar with GDPR, but more than half are still not cleaning their data and therefore not adhering to the GDPR’s legal requirements, a REaD Group survey reveals. The survey of 1… Continue reading SMEs awareness of GDPR is high, but few adhere to its legal requirements

How to prepare for Apple’s Mail Privacy Protection

Over the last few years, consumers began to be more concerned and have greater understanding of the importance of privacy. In a recent survey conducted by Statista, over half of respondents indicated a greater level of concern about their online privac… Continue reading How to prepare for Apple’s Mail Privacy Protection

The Evolution of Data Loss Prevention: Next-Generation Security Programs Require Human-Centric Approaches

In a year full of company milestones, it’s not surprising that we have more great news to share. We were recently the only company named a Leader and Fast Mover in the GigaOm Radar Report for Data Loss Prevention. If you’re interested in checking out t… Continue reading The Evolution of Data Loss Prevention: Next-Generation Security Programs Require Human-Centric Approaches

FlyTrap Android Trojan Snares Victims

Logging in to the right domain doesn’t always guarantee security, something users don’t always seem to realize, according to researchers at Zimperium zLabs. Over the last six months, the researchers detailed multiple instances of a new Android Trojan,… Continue reading FlyTrap Android Trojan Snares Victims

Should Disclosure of Ransom Payments be Mandatory?

As ransomware wreaks havoc across the globe and criminal entities continue to fill their coffers with ransom payments, legislators search for a way to stem the tide. The average ransom paid is $136,576, according to Coveware whose analysis also noted … Continue reading Should Disclosure of Ransom Payments be Mandatory?

Taking a Regulation-Agnostic Approach to Privacy

Don’t look now, but the next generation of privacy rules is arriving in the United States. As if …
Read More
The post Taking a Regulation-Agnostic Approach to Privacy appeared first on Hyperproof.
The post Taking a Regulation-Agnostic Approach to Pr… Continue reading Taking a Regulation-Agnostic Approach to Privacy