Blog Posts Tagged with "Data Protection"
Best Practices for Remote Workers’ Endpoint Security
July 22, 2019 Added by:Mathivanan Venkatachalam
One of an IT admin’s most important jobs is to secure that data while it’s stored on and accessed by corporate and personal endpoints.
Comments (0)
Gaining Control of Security and Privacy to Protect IoT Data
April 24, 2019 Added by:Mike Nelson
It’s a matter of who is in control of our data. Today, IoT device manufacturers and businesses are in control. In the future, we must be in control of our own information.
Comments (0)
Will We Get a GDPR for the IoT?
November 28, 2018 Added by:Scott Gordon
It might then be a good idea to imbue IoT security with the kind of weight that the GDPR gives personal data.
Comments (0)
Why Admin Rights Removal Is only the First Step towards Data Protection
September 11, 2018 Added by:Andrew Avanessian
Those that are committed to developing stronger safeguards against cyber threats shouldn’t rely on just one method to keep their data safe.
Comments (0)
4 Cybersecurity Tips for Staying Safe During the World Cup
June 13, 2018 Added by:Joseph Carson
As the first games approach, here are four cybersecurity best practices that you can use to stay safe during the 2018 World Cup.
Comments (0)
Unconventional Thinking — Four Practices to Help Mitigate Risk
April 02, 2018 Added by:Sanjay Ramnath
Organizations must proactively assess their security posture and focus on mitigating risk with unconventional approaches to achieve true security and reduction of successful cyber events.
Comments (0)
Why the GDPR is Important to Your Organization
August 14, 2017 Added by:Steve Durbin
The GDPR is the biggest shake-up of global privacy law in decades as it redefines the scope of EU data protection legislation.
Comments (0)
How to Choose the Right Data Protection Strategy
August 02, 2017 Added by:Dave Packer
A deep dive on data protection solutions and how they fit unique needs.
Comments (0)
Are Job Seekers at Risk of a Cyber Breach?
April 07, 2017 Added by:Amir Geri
Job seekers are regularly expected to input personal information about themselves to company and state databases, but it should be guaranteed that their information will remain secure.
Comments (0)
FriendFinder Breach Highlights the Need for Better Practice in Password Security
January 31, 2017 Added by:Donato Capitella
The FriendFinder Network breach is a perfect example of how poor password storage can exacerbate the impact of a breach and expose accounts to further exploitation.
Comments (0)
Avoiding Ransomware with Strong Endpoint Security
May 26, 2016 Added by:Dean Dyche
Ransomware attacks are growing in volume and sophistication. To best defend against ransomware, users must ensure that their machines remain up to date with the latest patches and security updates.
Comments (0)
Six Things to Know About Computer Theft
March 15, 2016 Added by:Eyal Bek
Besides the usual precautions, encryption can put a huge dent in the problem by making stored information unintelligible to intruders. Self-encrypting drives further help by minimizing the performance impact by offloading encryption to specialized hardware and taking humans out of the picture.
Comments (0)
Managing My Company’s Security is a Nightmare
May 17, 2013 Added by:Luis Corrons
IT Departments are very often one step behind users, and unfortunately in most cases there is no real control over all devices on the corporate network. Despite perimeter solutions still being a necessity, the corporate perimeter must now expand to include new devices (mainly smartphones and tablets) that also handle confidential corporate information.
Comments (0)
Protect Data Not Devices?
April 05, 2013 Added by:Simon Moffatt
As the devices becomes smarter, greater emphasis is placed on the data and services those devices access. Smartphones today come with a healthy array of encryption features, remote backup, remote data syncing for things like contacts, pictures and music, as well device syncing software like Dropbox. How much data is actually specifically related to the device?
Comments (0)
Keeping Safe In The Cloud
September 09, 2012 Added by:Ben Kepes
“With the cloud, you don’t own anything. You already signed it away through the legalistic terms of service with a cloud provider that computer users must agree to... the more we transfer everything onto the web, onto the cloud, the less we’re going to have control over it...”
Comments (0)
Losing Trust: Canadian Data Breach Spotlights Human Error
July 27, 2012 Added by:Kelly Colgan
It’s not just about protecting ourselves from identity theft or fraud like when our account number or government-issued ID numbers are exposed. It’s what I like to call privacy for the sake of privacy. Just knowing that someone could be looking at our personal histories doesn’t sit well with the public...
Comments (0)
- SecurityWeek Names Ryan Naraine as Editor-at-Large
- Why Cyber Security Should Be at the Top of Your Christmas List
- United States Federal Government’s Shift to Identity-Centric Security
- How Extreme Weather Will Create Chaos on Infrastructure
- BSIMM11 Observes the Cutting Edge of Software Security Initiatives
- Sustaining Video Collaboration Through End-to-End Encryption
- Will Robo-Helpers Help Themselves to Your Data?
- Securing the Hybrid Workforce Begins with Three Crucial Steps
- A New Strategy for DDoS Protection: Log Analysis on Steroids
- COVID-19 Aside, Data Protection Regulations March Ahead: What To Consider