Absolute DDS

How the Sochi Winter Games Affects the Enterprise
How the Sochi Winter Games Affects the Enterprise

The 2014 Winter Olympics are set to begin this Friday, February 7th, in the Russian city of Sochi. Whether you’re aware or not, a wave of Sochi-related threats are a real threat for enterprises in the upcoming weeks. The top enterprise threats from the Sochi Winter Games are: Phishing attacks around the Winter Games Threats from employees, contractors or contacts at the Winter Games Phishing at the Winter Games...

READ MORE
Cigna-HealthSpring Has Peace of Mind with Absolute
Cigna-HealthSpring Has Peace of Mind with Absolute

Kyle Duke, Vice President of Information Technology and Chief Information Security Officer at Cigna-HealthSpring shares how Cigna HealthSpring manages data security to maintain compliance with HIPAA’s strict data protection regulations in our customer video. Cigna-HealthSpring got its start in 2000 and is now a leading health service company in the US, based in Nashville, Tennessee. As one of the largest and fastest-growing coordinate care plans with a focus on Medicare Advantage plans,...

READ MORE
Employees Putting Data at Risk: Endpoint Security Can Help
Employees Putting Data at Risk: Endpoint Security Can Help

Research released earlier this year from SONY VAIO in their Digital Business Report 2013 shows that employees are acting carelessly with corporate data and corporate devices, putting business “at risk from a ticking data security tomb bomb.” The report reveals some startling figures about the carelessness of employees while also highlighting that organizations do not have appropriate technologies in place to prevent this risky behavior: 90% of employees in...

READ MORE
Data Security: Is the Endpoint Safer than the Cloud?
Data Security: Is the Endpoint Safer than the Cloud?

Former security contractor and former CIA and NSA employee Edward Snowden recently leaked secret documents revealing that the National Security Agency (NSA) in the US has been working with technology companies to weaken encryption standards and has been using programs to intercept telephone metadata and surveil the Internet. While discussions could be had on topics such as whistle blowing, surveillance, government secrecy and national security, the key takeaway for businesses...

READ MORE
The State of Endpoint Data Security
The State of Endpoint Data Security

Absolute Software’s recently released 2012 Endpoint Security Report details device theft insights from the 12,705 investigations we completed in 2012. As the first company to offer remote data delete technology, we monitor the frequency and size of data delete requests which continue to increase year over year. In 2012, customers performed 6,442 data delete commands, up 35% from the 4,812 commands in 2011. In addition, Absolute Software executed 401 successful file retrievals, a...

READ MORE