Data & Device Security

Invest in your Security Culture
Invest in your Security Culture

Although the risk landscape facing organizations is always changing, the insider threat consistently remains the top source of data breaches. The insider threat is there to amplify any threat: cyberattacks, BYOD, cloud, IoT. Every new threat is made worse by people. So, how do you address the Insider Threat? The top of every list now is the recognition that the solution to the Insider Threat does not come in...

READ MORE
Your BYOD Devices are Your Biggest Vulnerability
Your BYOD Devices are Your Biggest Vulnerability

Mobile devices are the greatest cyber vulnerability for organizations, suggests a new report. Based on the data on its 10 million mobile device subscriber base and the Zimperium Global Threat Intelligence Lab, the report indicates that 60% of mobile devices in enterprise BYOD environments are vulnerable to known cyberthreats. We’ve noted for years that endpoint devices have continued to expanded the attack surface for cybercriminals, providing an entryway to...

READ MORE
SMBs Putting Data at Risk in Free Cloud Storage
SMBs Putting Data at Risk in Free Cloud Storage

Small- to medium-sized businesses (SMBs), organizations with 50 to 500 employees, currently rank security as their top priority when shopping for a cloud storage provider and yet a whopping quarter of SMBs still only use a free version of cloud storage – likely the least secure option. More worryingly, a small but significant percentage of SMBs use free cloud storage services to store sensitive data such as banking and...

READ MORE
Seeking Clarity for IoT
Seeking Clarity for IoT

When it comes to IT acronyms and technical jargon fly fast and free. We’re always looking for a new way to name things, it seems. Shadow IT. Shadow Data. IoT. Shadow IoT. Security of Things. The desire for clarity through naming conventions can overshadow the message. When it comes down to it, most of the conversations are actually the same. It’s about data security. And it’s also about reputation management....

READ MORE
Decentralization of IT Tech Increases Security Risk
Decentralization of IT Tech Increases Security Risk

IT is becoming increasingly decentralized, with purchasing and management decisions being made at the business level. As cloud computing continues to move technology beyond IT, data is increasingly at risk. According to a new study by VMware, 69% of respondents believe IT has become increasingly decentralized over the past 3 years and 57% agree that this decentralization has resulted in the purchasing of non-secure solutions. “The IT Archipelago: Fragmentation...

READ MORE