dcsimg

How to Secure Data on IoT Devices in 5 Easy Steps

Over the last few years, the growth in Internet of Things (IoT) connected devices has increased exponentially, transforming how enterprises and small businesses collect, store, process and manage data. The growth in IoT connected devices presents a lot of exciting opportunities for innovation and improvements in the way we get insights into customer behavior, business processes, operational costs … [Read more...]

How to Make Your Security Budget Go Further: Stop Responding and Start Preventing

At Lepide, I chat with quite a lot of customers, and there is a common sentiment that comes up; “we need a bigger security budget.” I think everyone would agree that addressing the security problems of today requires the allocation of a sensible budget. However, I think that the main challenge is not the amount of money being spent, it is spending that available budget on the right things and … [Read more...]

What is a Cybersecurity Assessment?

A cybersecurity assessment is a review of your current security controls to see how well they stack up against either known potential security threats or the threats you have directly encountered. The assessment will also evaluate whether you are adequately satisfying the relevant regulatory compliance requirements. While there is no fixed method for carrying out a formal risk assessment, the most … [Read more...]

5 Things You Must Get Right to Secure IaaS and PaaS

The cyber-security landscape is changing rapidly as increasingly more organizations are adopting Infrastructure as a Service (IaaS) and Platform as a Service (PaaS). We’re witnessing an inevitable shift, especially since the recent social distancing rules have resulted in large numbers of employees working from home and other remote locations. However, it wasn’t exactly a gradual … [Read more...]

Access Governance Best Practices: Least Privilege and Zero Trust

There’s no doubt that the world of data security is becoming increasingly more complex, as IT environments become more distributed, and attack vectors become more sophisticated. Organizations that store large amounts of sensitive data have so many things to think about. They need to make sure that they have a tried and tested incident response plan (IRP) in place. They need to know what data … [Read more...]

How Will COVID-19 Affect Cybersecurity Spending?

This is a good question, but it’s not one that is easy to answer. As it currently stands, most studies indicate that spending on cyber security will increase as a consequence of the corona virus pandemic. According to a recent report by Learn Bonds, 70% of organizations have plans to increase cybersecurity spending following the COVID-19 outbreak, with 55% of large organizations planning to … [Read more...]

5 Reasons Why You Need a Data Security Solution

It’s safe to say that most organizations that rely on information technology to carry out business operations will already have anti-virus software installed and a firewall (that is hopefully configured properly). Most will have some form of access control solution in place, protocols and solutions that deal with backup and recovery, and some (not all) will use encryption to protect their … [Read more...]

How Hyper-Automation Will Affect Data Security

According to predictions made by Gartner, “hyper automation” will be the number one strategic technology trend for 2020. What is Hyper-Automation? Hyper-automation relies on artificial intelligence (AI) and machine learning (ML) to automate processes that would otherwise be executed by humans. A hyper-automated system is one that can “discover, analyze, design, automate, measure, … [Read more...]

What COVID-19 Means for Digital Transformation

Let’s face it, 2020 hasn’t got off to a great start. The coronavirus pandemic, which has so far infected more than 550,000 people globally, has forced Governments across the globe to effectively shut down large parts of their economies, with citizens in many countries being required to stay at home. The travel industry has been badly damaged due to the travel restrictions, and … [Read more...]

The CIO Security Checklist: Questions to Answer

Some larger companies will employ both a Chief Information Officer (CIO) and a Chief Information Security Officer (CISO). They are both responsible for protecting and managing sensitive data, although the role of the CIO is much broader. The role of the CISO is to ensure that proper controls are in place to protect the company’s digital assets, while the role of the CIO is to ensure that the … [Read more...]