Archive for the ‘Data Security’ Category

The ability to determine who should and shouldn’t have access to what data, is an integral part of any data security strategy, or at least it should be. Unfortunately, many organizations still don’t have the control that they need to keep their data secure. Many don’t have a complete inventory of what data they store, let alone a clear understanding of how that data is being accessed. According to a … Read more

If your company stores personally identifiable information, or sensitive data of any kind, you’re going to need to have robust data security to ensure you are protected from insider threats, malware, rogue administrators and other data breaches. IT teams must implement third-party data breach detection and prevention solutions to detect, prevent and respond to potential security threats. Achieving the required level of data security without the use of a third-party … Read more

Are you confident that your organization would not experience a data breach? If I were you, I wouldn’t be. Recent studies have confirmed that 88% of organizations in the UK were breached last year in some way, shape or form – and the USA is doing no better. The consequences of the breaches vary drastically, with some breaches being imperceptible from the inside. It’s very possible that you have already … Read more

There are some simple Group Policy Settings, which if appropriately configured, can help to prevent data breaches. You can make your organizational network safer by configuring the security and operational behavior of computers through Group Policy (a group of settings in the computer registry). Through Group Policy, you can prevent users from accessing specific resources, run scripts, and perform simple tasks such as forcing a particular home page to open … Read more

Data protection regulations such as HIPAA, PCI-DSS and SOX, have unquestionably made an impact on the way organizations protect their sensitive data. However, unlike the GDPR, the average person has probably never heard of them. Since the advent of the EU General Data Protection Regulation (GDPR), business executives have been under increasing pressure to get their house in order and clean up their data security practices. After all, a failure … Read more

All enterprises should have a data breach incident response plan in place to help minimize the damage caused by a cyber-attack. The plan should enable enterprises to recover in the shortest time possible, with the least amount of money spent, and damage caused to their reputation. The plan should include a list of processes that should be executed in the event of a breach and should also provide a clear … Read more

Almost 15 billion data records have been lost or stolen since 2013 – an issue that affects North America disproportionately more than other parts of the world. Should a company fall victim to an effective data breach, it could result in a loss of reputation, and could incur heavy financial losses. According to the 2019 Cost of a Data Breach Report by the Ponemon Institute, the global average cost of … Read more

These days, organizations store vast amounts of data. In fact, 65% of companies are collecting too much data, and are unable to find the time or the resources to analyze it. Not surprisingly, 54% of organizations didn’t know where all of their sensitive data is located. If businesses are unable to identify exactly what data they have and how it is being used, how are they supposed to protect it? … Read more

If we look at some of the most high-profile data breaches of the last few years, you will be astonished at how long it took for the organization involved to detect. Companies as big and as well-equipped as Verifone, took 6 months to detect the data breach that first started in the middle of 2016. It took Forever 21 around 9 months to detect their data breach that started in … Read more

As data breaches continue to make the headlines, more businesses are looking towards encryption technologies to help them secure their critical assets, both at rest and in transit. What is Data Encryption? Data encryption is the method of translating data into another form or code so that access to the data is limited to only those with the correct decryption key (or password). Encrypted data, sometimes referred to as ciphertext, … Read more