Upcoming Webinar - Why the CISO Needs to Take a Data-Centric View on Security         April 22 at 2 pm EDTRegister Now
Archive for the ‘Data Security’ Category

Emotet is a form of banking malware that was first discovered in 2014. Like many other forms of malware, its main objective is to extract sensitive information from the victim’s computer. However, unlike other forms of malware, Emotet is able to evade most anti-virus products. Hewlett-Packard reported a 1200% increase in the number of attacks using the Emotet Trojan, supporting a surge in ransomware campaigns. The Department of Homeland Security … Read more

It is completely understandable why organizations are concerned about the security implications of storing large amounts of valuable data in the cloud. After all, they have no direct control over the policies, procedures and technologies that are used to safeguard their data from malicious actors, which includes safeguarding the data from the service provider’s own employees. However, it is always important to put things in perspective. To start with, a … Read more

Carrying out regular data security risk assessments is vital to establishing current security gaps and recommending remediations for breach prevention. Many compliance regulations mandate risk assessments as part of a comprehensive security strategy.   What is a Data Security Risk Assessment? Data risk assessments can be broken down into three fundamental steps. First, identifying what the risks are to sensitive data and security states. Secondly, identify and organize your data … Read more

  Remote working and COVID-19 have accelerated the use of Microsoft Teams over the last 12 months. As a collaboration and sharing platform, MS Teams has been a savior to many remote working teams. However, not unlike other collaboration and sharing platforms, MS Teams does have a number of security vulnerabilities that security and IT teams need to understand and address. In this blog, we will go through what MS … Read more

Google Drive has become an invaluable data storage facility for many organizations, as it enables employees to collaborate on projects, regardless of where they are located in the world. Is Google Drive Safe for Business? Of course, Google takes security very seriously, however, as with any cloud service provider, there are inherent risks that you need to be aware of. The most obvious risk being that you are essentially trusting … Read more

A cybersecurity assessment is a review of your current security controls to see how well they stack up against either known potential security threats or the threats you have directly encountered. The assessment will also evaluate whether you are adequately satisfying the relevant regulatory compliance requirements. While there is no fixed method for carrying out a formal risk assessment, the most intuitive approach is to start with a list of … Read more

Cybersecurity audits help organizations establish whether their current cybersecurity practices, policies and tools are up to the task of keeping their data and systems secure. However, cybersecurity audits can be tricky to do on a regular basis when you aren’t sure exactly what to look for. In this blog, I will go through some best practices for your cybersecurity and internal audit to give you some guidance in how best … Read more

Amazon Web Services (AWS) has become one of the most popular cloud service providers on the market. As with most reputable cloud providers, AWS is relatively easy to use, scalable, affordable and flexible. They typically provide reliable encryption and security features, and various collaboration services that can help organizations streamline their business operations. However, when using any cloud service provider, there are a number of security and privacy issues, primarily … Read more

With increasingly more people working from home as a result of the ongoing coronavirus pandemic, many organizations have been switching to Microsoft Office 365, and other cloud-based collaboration platforms to help streamline their business operations. However, there are a number of security implications that need to be considered before doing so, and organizations need be aware of the configuration options that exist, to help them secure their O365 implementation. In … Read more

Few industries have fared well during the corona virus pandemic. As you would expect, most of the industries that have either stayed afloat or managed to capitalize on the crisis were those that generated a significant portion of their revenue from online sales. Online shopping, food delivery services, entertainment, gaming, e-learning, dating, and videoconferencing, were amongst the industries that made the most gains during these troubled times. Businesses offering products … Read more