Surveys & Reports

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Fusce augue justo, viverra at luctus vitae, dapibus eu odio. Morbi vestibulum orci neque, vulputate pharetra purus fringilla in.

Nearly 60% of UK Workers Using BYOD Outside IT Control
Nearly 60% of UK Workers Using BYOD Outside IT Control

Although some recent reports have been trying to downplay the “mobile threat” by saying mobile malware has not been a significant contributor to data breaches. This simplifies the mobile problem over much, unfortunately, assuming that malware is the only threat vector on a mobile device. In reality, mobility amplifies the risk to data breach from many angles.

READ MORE
The Challenges of Effective Security Awareness Training
The Challenges of Effective Security Awareness Training

At Absolute, we talk a lot about building a holistic approach to data security, one which includes people, processes and layered technologies. The Verizon 2015 Data Breach Investigations Report (DBIR) indicated that 90% of security incidents could still be tied back to “people,” which shows that focusing on employee training and awareness can go a long way to reducing security incidents and subsequent data breaches in all their forms...

READ MORE
Healthcare Organizations Unprepared to Detect or Mitigate Breaches: Ponemon Study
Healthcare Organizations Unprepared to Detect or Mitigate Breaches: Ponemon Study

The Fifth Annual Benchmark Study on Privacy and Security of Healthcare Data, compiled by Ponemon Institute on behalf of ID Experts, shows the evolution of healthcare data breaches that reflect the increased value of healthcare data. The reality is that healthcare data is so valuable now that cybercriminals have shifted their attacks to the healthcare industry, making criminal attacks the top threat to healthcare data. Though this sounds terrifying,...

READ MORE
DoJ Releases Data Breach Response Plan Best Practices
DoJ Releases Data Breach Response Plan Best Practices

The Department of Justice Computer Crime & Intellectual Property Section (CCIPS) Cybersecurity Unit just released a guide on Best Practices for Victim Response and Reporting of Cyber Incidents alongside its remarks on the Division’s Cybersecurity Industry Roundtable.

READ MORE
People Still at the Core of Security Incidents: 2015 DBIR
People Still at the Core of Security Incidents: 2015 DBIR

The 2015 Data Breach Investigations Report, just released by Verizon, continues to adopt the methodology of nine common threat patterns, as well as expanding into discussions of threats from mobility and the Internet of Things (IoT) and the financial impact of a data breach.This year’s report looked at 12 terabytes of data, combining data from 70 organizations, 79,790 security incidents from 61 countries, as well as 2,122 confirmed data...

READ MORE