What is the HIPAA Security Rule? Three safeguards to have in place

The past year has catalyzed a new era of healthcare, one where telehealth visits increased as we relied on online communication to keep ourselves informed and healthy. With these adoptions also comes new challenges and considerations, and in this case,… Continue reading What is the HIPAA Security Rule? Three safeguards to have in place

Things that are easy to miss in the race towards hybrid working and the cloud

The mega-trend towards hybrid working and cloud migration seems unstoppable. But customer service organizations could find their wheels come off if they fail to address a hazardous twist in the transformation journey. For many businesses, switching to … Continue reading Things that are easy to miss in the race towards hybrid working and the cloud

What Does The Great Resignation Mean for Data Security?

You may not realize it yet, but we’re living through the latest zeitgeist. It’s the Great Resignation. You may have heard it being tossed around the media or witnessed it firsthand, or even been a part yourself. Either way, it’s happening across the United States. And it affects data security as much as it affects […]

The post What Does The Great Resignation Mean for Data Security? appeared first on Security Intelligence.

Continue reading What Does The Great Resignation Mean for Data Security?

How businesses use data might not be popular with the public

A KPMG survey reveals a deep disconnect between corporate data practices and the general population’s expectations around transparency and data privacy. As companies collect more personal data, survey respondents are increasingly concerned about how th… Continue reading How businesses use data might not be popular with the public

Demand for data is growing, but so are data supply chain challenges

Data suppliers are unable to efficiently deliver relevant data to a growing number of data consumers, according to a 451 Research survey. 55% of those surveyed report that data is often stale or out-of-date by the time it is consumed or analyzed. Lack … Continue reading Demand for data is growing, but so are data supply chain challenges

Reliance on third party workers making companies more vulnerable to cyberattacks

A survey from SecZetta revealed 83% of respondents agree that because organizations increasingly rely on contractors, freelancers, and other third party workers, their data systems have become more vulnerable to cyberattacks. Further, 88% of people say… Continue reading Reliance on third party workers making companies more vulnerable to cyberattacks

SMEs awareness of GDPR is high, but few adhere to its legal requirements

85 percent of the small- to medium-sized enterprises (SMEs) in the UK are familiar with GDPR, but more than half are still not cleaning their data and therefore not adhering to the GDPR’s legal requirements, a REaD Group survey reveals. The survey of 1… Continue reading SMEs awareness of GDPR is high, but few adhere to its legal requirements

How to prepare for Apple’s Mail Privacy Protection

Over the last few years, consumers began to be more concerned and have greater understanding of the importance of privacy. In a recent survey conducted by Statista, over half of respondents indicated a greater level of concern about their online privac… Continue reading How to prepare for Apple’s Mail Privacy Protection

The Evolution of Data Loss Prevention: Next-Generation Security Programs Require Human-Centric Approaches

In a year full of company milestones, it’s not surprising that we have more great news to share. We were recently the only company named a Leader and Fast Mover in the GigaOm Radar Report for Data Loss Prevention. If you’re interested in checking out t… Continue reading The Evolution of Data Loss Prevention: Next-Generation Security Programs Require Human-Centric Approaches

FlyTrap Android Trojan Snares Victims

Logging in to the right domain doesn’t always guarantee security, something users don’t always seem to realize, according to researchers at Zimperium zLabs. Over the last six months, the researchers detailed multiple instances of a new Android Trojan,… Continue reading FlyTrap Android Trojan Snares Victims