Corporate

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Fusce augue justo, viverra at luctus vitae, dapibus eu odio. Morbi vestibulum orci neque, vulputate pharetra purus fringilla in.

Invest in your Security Culture
Invest in your Security Culture

Although the risk landscape facing organizations is always changing, the insider threat consistently remains the top source of data breaches. The insider threat is there to amplify any threat: cyberattacks, BYOD, cloud, IoT. Every new threat is made worse by people. So, how do you address the Insider Threat? The top of every list now is the recognition that the solution to the Insider Threat does not come in...

READ MORE
Decentralization of IT Tech Increases Security Risk
Decentralization of IT Tech Increases Security Risk

IT is becoming increasingly decentralized, with purchasing and management decisions being made at the business level. As cloud computing continues to move technology beyond IT, data is increasingly at risk. According to a new study by VMware, 69% of respondents believe IT has become increasingly decentralized over the past 3 years and 57% agree that this decentralization has resulted in the purchasing of non-secure solutions. “The IT Archipelago: Fragmentation...

READ MORE
Most Canadian Organizations Admit Cloud Security Failures
Most Canadian Organizations Admit Cloud Security Failures

Cloud technology is revolutionizing businesses the world over, extending the capabilities of employees to work and collaborate anytime, anywhere on any device. However, what we are seeing right now is that many uses of the Cloud are disorganized, with most Cloud purchasing being organized at the business unit or employee level. This leads to a chaotic distribution of cloud applications that remain outside the control of IT, contributing to...

READ MORE
What China's New Cybersecurity Law Means for You
What China's New Cybersecurity Law Means for You

The Chinese government has just passed a cybersecurity law that has broad implications for international businesses. The move comes with great criticism, with some calling the law “draconian” and “abusive” while others note the law is “vague” enough to spark worries of “censorship and espionage.” The legislation was passed on Monday, set to take effect in June 2017. Move to Counter Hacking and Terrorism The Chinese government adopted the...

READ MORE
Is Your Data Breach Response Plan Effective?
Is Your Data Breach Response Plan Effective?

We’ve posted many times about the importance of having a data breach response plan in place. Indeed, the FTC just released its own guidance on data breach response. A new study, however, demonstrates that “having a response plan is simply not the same as being prepared,” particularly if that response plan is not kept up to date. New Ponemon Survey Ponemon surveyed 619 executives and staff employees who work...

READ MORE