25% of IT workers don’t enforce security policies

14% of IT workers are consumed with Identity and Access Management (IAM), spending at least an hour per day on routine IAM tasks, according to 1Password. IAM continues to be a significant productivity bog for IT and employees alike, with 57% of IT work… Continue reading 25% of IT workers don’t enforce security policies

Threat highlight: Analysis of 5+ million unmanaged, IoT, and IoMT devices

A new study incorporates analysis of anonymized data from more than 5 million unmanaged, IoT, and IoMT devices in Ordr customer deployments across a variety of verticals including healthcare, life sciences, retail and manufacturing, between June 2019 a… Continue reading Threat highlight: Analysis of 5+ million unmanaged, IoT, and IoMT devices

Ransomware attacks are increasing, do you have an emergency plan in place?

39% of organizations either have no ransomware emergency plan in place or are not aware if one exists. This is despite more ransomware attacks being recorded in the past 12 months than ever before, Ontrack reveals. Cyberattacks and data breaches can ha… Continue reading Ransomware attacks are increasing, do you have an emergency plan in place?

Because IT security and the C-suite are misaligned, digital transformation increases cyber risk

While digital transformation is understood to be critical, its rapid adoption, as seen with cloud providers, IoT and shadow IT, is creating significant cyber risk for most organizations. Today, these vulnerabilities are only exacerbated by misalignment… Continue reading Because IT security and the C-suite are misaligned, digital transformation increases cyber risk

Assessing Security Protocols During Remote Work

Now that businesses are beginning to reopen and there is a slow migration back to the workplace, organizations can take a closer look at how the transition to remote work and security have been managed. According to a new survey conducted by 1Password… Continue reading Assessing Security Protocols During Remote Work

How to Build Usability Into Your Security Program

Having solid security measures in place is a necessary condition for achieving your organization’s overarching goals, but user productivity requires both security and usability.

The post How to Build Usability Into Your Security Program appeared first on Security Intelligence.

Continue reading How to Build Usability Into Your Security Program

Home workplaces introduce new risks, poor password hygiene

Entrust Datacard released the findings of its survey which highlights the critical need to address data security challenges for employees working from home as a result of the pandemic based on responses from 1,000 US full-time professionals. As social … Continue reading Home workplaces introduce new risks, poor password hygiene

Glass Class: High-performance Security – The PolyScale Architecture

How do cloud security architectural design decisions affect vendors’ ability to provide a performant, scalable, and reliable platform?
Take the example of an offsite meeting.  Thousands of normally geographically dispersed employees converg… Continue reading Glass Class: High-performance Security – The PolyScale Architecture

Inadvertent Insider Threats Present a Unique Challenge to Organizations

While we may imagine inadvertent insider threats as careless people clicking on dodgy emails, this image needs to be updated to include a wide variety of poor security hygiene behaviors.

The post Inadvertent Insider Threats Present a Unique Challenge to Organizations appeared first on Security Intelligence.

Continue reading Inadvertent Insider Threats Present a Unique Challenge to Organizations