Uncategorized

2017 Will be a Regulatory Wake-Up Call
2017 Will be a Regulatory Wake-Up Call

There have been many predictions for 2017 which have touched on the impact that the EU GDPR will have on organizations around the globe, but the truth is that the GDPR is not the only change on the horizon. Federal, state, and industry regulators have all made moves in the past year indicating that 2017  will an increase in frequency and severity of compliance investigations and fines and perhaps...

READ MORE
Predictions for Corporate Data in 2017: The Endpoint is Everywhere
Predictions for Corporate Data in 2017: The Endpoint is Everywhere

As 2016 nears the end, it would be satisfying to gaze back on all the successes that organizations have had in combatting the rising tide of data risks. Sadly, that tide keeps on rising. Data breaches in 2016 are already up 31% over 2015 figures, breaching over 35 million records, a figure set to rise to 1.35 billion breached records with the news of the massive breach at Yahoo....

READ MORE
People Continue to Remain Top Cyberthreat
People Continue to Remain Top Cyberthreat

Echoing the findings from the past year, and despite growing media frenzies over cyberattacks and malware, people continue to remain the top cyberthreat to businesses in North America. In North America, the most serious data breaches were attributed to careless / uninformed employee actions in 59% of cases and phishing / social engineering in 56% of cases. According to Business Perception of IT Security, a report from Kaspersky Lab as...

READ MORE
Modern Embedded Endpoint Security with Absolute DDS: IDC Technology Spotlight
Modern Embedded Endpoint Security with Absolute DDS: IDC Technology Spotlight

Enterprise IT teams face an uphill struggle to maintain visibility into and control over corporate resources and to mitigate risks to critical business assets. The ever-growing distributed nature of corporate networks, brought about by Cloud adoption and the proliferation of mobile devices, has increased the complexity over IT situational awareness while also narrowing the field of sight, enabling cybercrime to thrive. In a new Technology Spotlight by market intelligence...

READ MORE
Visibility Key to Thwarting Changing Threat Profile
Visibility Key to Thwarting Changing Threat Profile

Right now, we are on the cusp of major change – the expansion of mobile device options, BYOD, the cloud, and the decentralization of IT. Many of these changes are only in their infancy in terms of their current impact on the corporation. In four years time, the technologies we use and the threats they present will be entirely different. The McAfee Labs 2017 Threats Predictions report explores what...

READ MORE