Data & Device Security

Security Posture Dashboards in Absolute DDS: A Deeper Look
Security Posture Dashboards in Absolute DDS: A Deeper Look

As part of the November 2016 release of Absolute Data & Device Security (DDS), we released new Security Posture Reports and a convenient Security Dashboard. With instant access to the health status of critical security layers and aggregate assessments of your entire security stack, you can take firm control of your security posture. Absolute DDS Provides Visibility into Multi-Layered Security In today’s constantly evolving cybersecurity landscape, no one security layer alone is sufficient...

READ MORE
Security is Top Business Goal in Healthcare
Security is Top Business Goal in Healthcare

The College of Healthcare Information Management Executives (CHIME) recently asked 100 CIOs about their perspectives on communications in healthcare, from business goals to technology changes to security. The survey revealed that strengthening data security is the top goal of 81% of healthcare organizations, ahead of increasing patient satisfaction (70%) and physician satisfaction (65%). Healthcare breaches up 30% in 2016 Given the continued rise in data breaches affecting the healthcare...

READ MORE
Most Canadian Organizations Admit Cloud Security Failures
Most Canadian Organizations Admit Cloud Security Failures

Cloud technology is revolutionizing businesses the world over, extending the capabilities of employees to work and collaborate anytime, anywhere on any device. However, what we are seeing right now is that many uses of the Cloud are disorganized, with most Cloud purchasing being organized at the business unit or employee level. This leads to a chaotic distribution of cloud applications that remain outside the control of IT, contributing to...

READ MORE
New Device Usage Reports and Security Dashboards
New Device Usage Reports and Security Dashboards

Absolute Data & Device Security (DDS) November 2016 release introduces exciting new capabilities to monitor device usage, maximize device utilization, and gain a deeper level of visibility across your entire device population. As part of the new release, we’ve also launched a new Security Dashboard to give you an instant, visual assessment of your security posture. Evaluate Your Security Posture at a Glance Take firm control of your security posture...

READ MORE
Is Your Data Breach Response Plan Effective?
Is Your Data Breach Response Plan Effective?

We’ve posted many times about the importance of having a data breach response plan in place. Indeed, the FTC just released its own guidance on data breach response. A new study, however, demonstrates that “having a response plan is simply not the same as being prepared,” particularly if that response plan is not kept up to date. New Ponemon Survey Ponemon surveyed 619 executives and staff employees who work...

READ MORE