
Although the risk landscape facing organizations is always changing, the insider threat consistently remains the top source of data breaches. The insider threat is there to amplify any threat: cyberattacks, BYOD, cloud, IoT. Every new threat is made worse by people. So, how do you address the Insider Threat? The top of every list now is the recognition that the solution to the Insider Threat does not come in...
READ MORE
Mobile devices are the greatest cyber vulnerability for organizations, suggests a new report. Based on the data on its 10 million mobile device subscriber base and the Zimperium Global Threat Intelligence Lab, the report indicates that 60% of mobile devices in enterprise BYOD environments are vulnerable to known cyberthreats. We’ve noted for years that endpoint devices have continued to expanded the attack surface for cybercriminals, providing an entryway to...
READ MORE
Small- to medium-sized businesses (SMBs), organizations with 50 to 500 employees, currently rank security as their top priority when shopping for a cloud storage provider and yet a whopping quarter of SMBs still only use a free version of cloud storage – likely the least secure option. More worryingly, a small but significant percentage of SMBs use free cloud storage services to store sensitive data such as banking and...
READ MORE