Archive for the ‘Data Security’ Category

Most of the time, employees use their credentials to perform legitimate, predictable, day-to-day operations. There are times, however, when employees are required to perform actions which do not correlate with what is considered “normal” activity. After all, IT administrators are often required to carry out maintenance operations, which are typically conducted out of office hours, and these operations may include performing queries against a database which stores large amounts of … Read more

According to a new study by Beazley Breach plc, the healthcare industry recorded the highest number (41%) of data breaches of any industry in 2018. Education accounted for 10% of security incidents, 20% were from the financial sector, 13% from professional services, with other sectors making up the remainder. As for the top causes, hacking, malware and unintended disclosure accounted for 31% of security incidents. Insider threats accounted for 17% … Read more

With so many cybersecurity threats for you to watch out for, it can be difficult to keep up with all the acronyms, methods and protection techniques. With that in mind, we have created this quick guide to a commonly referred to method of cybersecurity attack; Advanced Persistent Threats (APTs). What is an Advanced Persistent Threat (APT)? An Advanced Persistent Threat is a method of cybersecurity attack in which unauthorized access … Read more

Privileged Access Management (PAM) is something that many organizations still struggle with on a day to day basis. One of the biggest reasons that this happens is because organizations do not prepare their Active Directory environment properly before starting their PAM project. What is Privileged Access Management (PAM)? Privileged Access Management (PAM) solutions usually center around an organization’s Active Directory environment and function as a way of delegating privileged access … Read more

p>Might it be true to say that the world of cybersecurity is evolving faster than any other industry right now? Probably not, but it’s certainly up there. Cybersecurity is achieving a level of maturation that we have not seen before, which is leading to many organizations implementing several security solutions in an attempt to become “secure”. Companies that change quickly and go through many different applications, solutions and processes, often … Read more

According to the 2018 Cost of a Data Breach Study, conducted by the Ponemon Institute, the average global cost of a data breach rose from $3.62 to $3.86 million annually, an increase of 6.4%. Data breaches are unquestionably problematic for businesses across the globe, with new strains of malware and other methods of fraudulently harvesting valuable data evolving at a pace that is faster than security experts can keep up. … Read more

Data Classification is a hot topic at the moment, with a flood of vendors on the market offering classification functionality standalone or as part of a more comprehensive data security platform. With all the competing vendors and information out there on data classification software, it can be difficult to know where to start. What is Data Classification? Simply put, data classification is the process by which data is sorted into … Read more

Naturally, the faster our security teams can identify a data breach, the faster they can move to eradicate and recover from the incident. The problem, however, is that many security incidents unfold in a very covert manner and can take weeks – or even months to discover. According to the M-Trends annual report by FireEye, the global median “dwell time” is 101 days. The first question we need to ask … Read more

Data is the life-blood of most organizations nowadays, with the value often being compared to oil or gold. The intrinsic value of data, combined with the rapid increase in the volume of data being generated, has led to widespread increase in cybercrime. Attackers are evolving and improving their approach every day, and many organizations are struggling to keep up. It may even surprise you to learn that many enterprise security … Read more

Whether you are a top-secret government branch, enterprise brand or a small business, insider threats should be top of your list of concerns right now. It doesn’t matter if you’re storing documents with market disrupting business plans, proof of alien life or even just a few credit card numbers; the value of data has grown exponentially over the last 5 years. You may think that your employees would never be … Read more