Archive for the ‘Data Security’ Category

In simple terms, Data Security Platforms (DSPs) are a type of data security solution that aims to combine a suite of traditionally siloed tools. Most Data Security Platforms will combine functionality designed to locate and protect data on-premises and in the cloud. The most popular functionality included in DSPs include data discovery and classification, privileges/permissions analytics, user/entity behavior analytics, compliance reporting and environment change auditing. All of this functionality is … Read more

Every admin worth his or her salt knows all about how to set up network file sharing in their Windows environment. The process is a fairly simple one and hasn’t really changed since Windows 2003. The difficulty comes when admins are asked to amend permissions to folders on a daily basis. If admins are being asked to assign permissions to folders continuously, there may be a tendency at some point … Read more

According to a recent report by Microsoft, the number of internet users will double to about four billion by the year 2020. Likewise, organizations are becoming increasingly more dependent on technology, and with this trend comes a large number of cyber-security threats. When I say “threats”, we’re not just dealing with the archetypal basement bandits that we tend to associate with cyber-crime, but with our own employees. Whether it be … Read more

Privileged Access Management (PAM) solutions help organizations to control and restrict permissions within their Active Directory. When used correctly, PAM solutions enable you to centralize privileged credentials to ensure a higher level of security around sensitive data, control access to that data and monitor suspicious behavior. Privileged Access Management solutions on their own, however, often fall short of providing the level of security and insight required to protect data and … Read more

Given the nature of the financial services industry, it understandable why it is a prime target for cybercriminals. After all, financial institutions deal with large amounts of money as well as sensitive data, which could be used for other fraudulent activities. Then there’s hacktivists and nation-state actors, who are politically motivated cybercriminals seeking to cause disruption, for whatever reason. Some of the most common threats to financial services include phishing, … Read more

It is becoming a widely accepted fact that human error is the root cause of most data breaches. However, the problem with this statement is that it raises more questions than it answers. After all, human error is the root cause of most problems. To clarify what this means in relation to cyber security, below is the top five most cited examples of erroneous behavior that might compromise the integrity … Read more

According to a recent poll carried out by cybersecurity firm NTT Security, 59% of respondents said that they were not confident that they could resume “business as usual” 24 hours after a cyber security incident. The poll was conducted over Twitter and attracted approximately 5,500 participants. Businesses were also asked about what their main concerns were when responding to a security incident. 59% of respondents said that they were concerned … Read more

The number of people working remotely rises each year as organizations look to offer more flexibility and reach further outside of their immediate radius when looking for talent. Working remotely has many benefits and some even believe remote workers outperform office workers. However, there are some risks to data security that present themselves more often through remote workers than anywhere else. In this blog we will go through six ways … Read more

Data is a company’s most valuable asset. Yet, we are still seeing many enterprise organizations failing to give their data the proper protection it requires. For companies, compliance auditors and customers alike, the privacy of data is a key concern. So, what exactly is data privacy and how can you ensure that the data you store remains private? What is Data Privacy? Data Privacy (sometimes referred to as information privacy), … Read more

When we speak about data security to our customers, we always advise them that they need to build from the inside out, instead of from the outside in. The most important part of your organization, which for most is the data itself, is the asset that needs to be protected as a priority. When a new bank is planned and built, it isn’t designed around the floorplan or that existing … Read more