Archive for the ‘Data Security’ Category

Privileged Access Management (PAM) is something that many organizations still struggle with on a day to day basis. One of the biggest reasons that this happens is because organizations do not prepare their Active Directory environment properly before starting their PAM project. What is Privileged Access Management (PAM)? Privileged Access Management (PAM) solutions usually center around an organization’s Active Directory environment and function as a way of delegating privileged access … Read more

Might it be true to say that the world of cybersecurity is evolving faster than any other industry right now? Probably not, but it’s certainly up there. Cybersecurity is achieving a level of maturation that we have not seen before, which is leading to many organizations implementing several security solutions in an attempt to become “secure”. Companies that change quickly and go through many different applications, solutions and processes, often … Read more

According to the 2018 Cost of a Data Breach Study, conducted by the Ponemon Institute, the average global cost of a data breach rose from $3.62 to $3.86 million annually, an increase of 6.4%. Data breaches are unquestionably problematic for businesses across the globe, with new strains of malware and other methods of fraudulently harvesting valuable data evolving at a pace that is faster than security experts can keep up. … Read more

Data Classification is a hot topic at the moment, with a flood of vendors on the market offering classification functionality standalone or as part of a more comprehensive data security platform. With all the competing vendors and information out there on data classification software, it can be difficult to know where to start. What is Data Classification? Simply put, data classification is the process by which data is sorted into … Read more

Naturally, the faster our security teams can identify a data breach, the faster they can move to eradicate and recover from the incident. The problem, however, is that many security incidents unfold in a very covert manner and can take weeks – or even months to discover. According to the M-Trends annual report by FireEye, the global median “dwell time” is 101 days. The first question we need to ask … Read more

Data is the life-blood of most organizations nowadays, with the value often being compared to oil or gold. The intrinsic value of data, combined with the rapid increase in the volume of data being generated, has led to widespread increase in cybercrime. Attackers are evolving and improving their approach every day, and many organizations are struggling to keep up. It may even surprise you to learn that many enterprise security … Read more

Whether you are a top-secret government branch, enterprise brand or a small business, insider threats should be top of your list of concerns right now. It doesn’t matter if you’re storing documents with market disrupting business plans, proof of alien life or even just a few credit card numbers; the value of data has grown exponentially over the last 5 years. You may think that your employees would never be … Read more

According to the Global Risks Report 2019, carried out by the World Economic Forum (WEF), cyber-attacks and data breaches represent the most likely risk to businesses across North America. This is followed by terrorist attacks, economic instability and a failure to adapt to climate change. The threat landscape is continuously evolving, and businesses are become more reliant on technology. Companies are adopting an increasing number of interconnected devices – many … Read more

All enterprises should have an incident response plan in place to help minimize the damage caused by a cyber-attack. The plan should enable enterprises to recover in the shortest time possible, with the least amount of money spent, and damage caused to their reputation. The plan should include a list of processes that should be executed in the event of a breach and should also provide a clear guideline as … Read more

As we are consistently told by numerous Data Breach reports, insider threats are one of the biggest security concerns for enterprises all over the world. The damage that a rogue admin, for example, can cause in your environment is immeasurable. Often, insider threats are difficult to detect and can go undetected for years. User and Entity Behavior Analytics (UEBA) is often referred to as an effective method of detecting and … Read more