Archive for the ‘Data Security’ Category

At Lepide, I chat with quite a lot of customers, and there is a common sentiment that comes up; “we need a bigger security budget.” I think everyone would agree that addressing the security problems of today requires the allocation of a sensible budget. However, I think that the main challenge is not the amount of money being spent, it is spending that available budget on the right things and … Read more

Even before the current health crisis began to unfold, many executives and IT personnel have been debating about the practicalities and implications of storing and processing sensitive data in the cloud. Using cloud services for the storage and processing of valuable data is understandably tempting, as it allows organizations to eliminate numerous costs and responsibilities. There are, however, trade-offs that need to be taken into consideration, especially if you are … Read more

Emotet is a form of banking malware that was first discovered in 2014. Like many other forms of malware, its main objective is to extract sensitive information from the victim’s computer. However, unlike other forms of malware, Emotet is able to evade most anti-virus products. Hewlett-Packard reported a 1200% increase in the number of attacks using the Emotet Trojan, supporting a surge in ransomware campaigns. The Department of Homeland Security … Read more

It is completely understandable why organizations are concerned about the security implications of storing large amounts of valuable data in the cloud. After all, they have no direct control over the policies, procedures and technologies that are used to safeguard their data from malicious actors, which includes safeguarding the data from the service provider’s own employees. However, it is always important to put things in perspective. To start with, a … Read more

Carrying out regular data security risk assessments is vital to establishing current security gaps and recommending remediations for breach prevention. Many compliance regulations mandate risk assessments as part of a comprehensive security strategy. What is a Data Security Risk Assessment? Data risk assessments can be broken down into three fundamental steps. First, identifying what the risks are too sensitive data and security states. Secondly, identify and organize your data by … Read more

Remote working and COVID-19 have accelerated the use of Microsoft Teams over the last 12 months. As a collaboration and sharing platform, MS Teams has been a savior to many remote working teams. However, not unlike other collaboration and sharing platforms, MS Teams does have a number of security vulnerabilities that security and IT teams need to understand and address. In this blog, we will go through what MS Teams … Read more

Google Drive has become an invaluable data storage facility for many organizations, as it enables employees to collaborate on projects, regardless of where they are located in the world. Is Google Drive Safe for Business? Of course, Google takes security very seriously, however, as with any cloud service provider, there are inherent risks that you need to be aware of. The most obvious risk being that you are essentially trusting … Read more

A cybersecurity assessment is a review of your current security controls to see how well they stack up against either known potential security threats or the threats you have directly encountered. The assessment will also evaluate whether you are adequately satisfying the relevant regulatory compliance requirements. While there is no fixed method for carrying out a formal risk assessment, the most intuitive approach is to start with a list of … Read more

Cybersecurity audits help organizations establish whether their current cybersecurity practices, policies and tools are up to the task of keeping their data and systems secure. However, cybersecurity audits can be tricky to do on a regular basis when you aren’t sure exactly what to look for. In this blog, I will go through some best practices for your cybersecurity and internal audit to give you some guidance in how best … Read more

Amazon Web Services (AWS) has become one of the most popular cloud service providers on the market. As with most reputable cloud providers, AWS is relatively easy to use, scalable, affordable and flexible. They typically provide reliable encryption and security features, and various collaboration services that can help organizations streamline their business operations. However, when using any cloud service provider, there are a number of security and privacy issues, primarily … Read more