dcsimg

Are CISOs in High Demand?

It seems as though the demand for CISOs in the job market today is higher than ever before. CISOs are demanding higher salaries and are being given more responsibility at board level. To find out just how in demand CISOs are, we sat down with Nathan Powell of Henderson Scott – recruitment specialists in IT – to ask for his expert opinion on cybersecurity and the demand for CISOs. So … Read … [Read more...]

How CISOs Can Talk to the Rest of the Board About Data Security

We all know by now that cybersecurity isn’t just an IT problem. The dramatic effects a data breach can have on an organization, in terms of both reputation and damages from non-compliance, mean that everyone from the CMO to the CEO needs to be concerned about data security. One of the biggest problems organizations face is that their employees, particularly those with elevated privileges, … [Read more...]

LepideAuditor – a Real Alternative to Varonis

A few questions we get asked on a regular basis are “how do we compare with Varonis?” and “are Lepide a Varonis competitor?” To answer this question, I’ve created this blog and, whilst I’ve tried to be as unbiased as I can, clearly, I have a favorite. It’s also important to know this blog is in many places anecdotal, created from information obtained either from direct customer feedback or … [Read more...]

How the NIST Framework Helps Improve Data Security

In the aftermath of the Marriott breach, one of the biggest data breaches we’ve seen in 2018, it’s relevant to revisit some core security principles and how they can help you improve the security your data. One such principle is the National Institute of Standards and Technology Framework (or NIST Framework for short). NIST released the first version of their Framework back in February of 2014, … [Read more...]

8 Key Data Security Trends to Watch Out For in 2019

It’s that time of year again where we give you a little peak into what our security specialists believe will be the dominant data security trends in 2019. This year, we’ve highlighted 8 trends that have built up significant steam in 2018 and are ready to explode heading into the new year. So, let’s get started. 1. Wider Adoption of Data-Centric Audit & Protection There has been a lot of … [Read more...]

How Can We Prevent Employees Violating Security Policies?

Employees violate security policies on a regular basis, hence why the majority of data breaches are caused by insiders, in some way or another. Sure, sometimes security incidents are caused by disgruntled or opportunistic employees; however, most of the time the motives are less suspicious. So, what are the main reasons employees violate security policies? 1. A Lack of Security Awareness Training … [Read more...]

Why Cybersecurity Security Isn’t Just an IT Problem

This shouldn’t be a problem that we have to discuss but unfortunately the state of modern-day cyber-security prevents us from staying quiet on the topic. Studies show us that although mass attacks have slowed, smaller, more targeted attacks have been increasing dramatically over the last few years, with targeted phishing even becoming a paid-service. The volume of spam you probably get into your … [Read more...]

How Enterprises are Making Use of User & Entity Behavior Analytics (UEBA)

One of the most important ways to address your cybersecurity in today’s threat landscape is to ensure you know how your users are interacting with your sensitive data. By sensitive data, we’re referring not just to data containing company secrets or financials, but also to consumer and employee data. Personally identifiable information (data containing credit card numbers, addresses, names etc.) … [Read more...]

Tips to Protect Office 365 Data Against Ransomware

Ransomware remains a formidable threat to organizations worldwide. According to a recent survey conducted by Bitdefender, 75% of respondents experienced up to 5 attacks in the last 12 months alone, and organizations accounted for 42% of all ransomware infections. Though cyber-criminals have always targeted Microsoft products, the rapid growth in the popularity of Office 365 has made it a #1 target … [Read more...]

Ransomware VS Cryptojacking

Cryptojacking is a relatively new technique which enables cyber-criminals to illegally “mine” cryptocurrencies on both vulnerable web servers and unsuspecting users’ devices. Cryptocurrency mining is the process by which cryptocurrency “coins” are created. In simple terms, miners use computational resources to perform calculations, which involve iterating through billions of random inputs, … [Read more...]