dcsimg

Hardening Active Directory and Securing Unstructured Data Stores

Unstructured data is any data that is not stored in a pre-defined schema, and can include Word, text and PDF documents, photos, videos, MP3s, emails, data obtained via social media platforms and various types of personal data. According to a forecast by the IDC, 80 percent of global data will be unstructured by 2025. Unlike a relational database, for example, unstructured data can be difficult to … [Read more...]

Are Healthcare Providers Getting Worse at Preventing Data Breaches?

I would love to tell you that we’re making progress when it comes to minimizing the number of data breaches affecting healthcare service providers across the globe, but unfortunately, it doesn’t appear to be the case. In fact, the evidence from 2019 suggests that we may well be getting worse… In 2018, we recorded 503 healthcare related data breaches, with approximately 15 million … [Read more...]

The Importance of Security Incident Reporting

“If you see something, say something”, is the motto of the Department of Homeland Security. It’s a motto that is also highly relevant to ensuring that our systems and data are secure. In order to have an effective cyber security program, you need eyes and ears everywhere. All staff members of staff need to be involved, as the IT department simply doesn’t have the resources to be … [Read more...]

Information Security Trends During a Recession

When discussing information security trends in the event of a recession, the problem is that we are heading into uncharted waters. The number of annual data breaches have been constantly rising since 2005. We are also seeing an increase in the number of data breaches following the housing market crash of 2008, which is what we would expect, as cyber-criminals never let a crisis go to waste. Given … [Read more...]

The Role of Data Classification in Data Loss Prevention (DLP)

The purpose of data classification is to ensure that we know exactly what data we have, where it is located, and how sensitive the data is. Yet, despite how crucial it is to have this knowledge, it is an area of data security that is often overlooked. And then we have Data Loss Prevention (DLP). DLP referrers to the methods we use to prevent the unauthorized disclosure of internal data … … [Read more...]

What is Identity and Access Management (IAM)?

According to a recent survey, 74% of breaches involved access to a privileged account, and yet many organizations are still failing to take the steps necessary to prevent the abuse of privileged credentials. Ensuring that privileged accounts are secure requires Identity and Access Management (IAM) – a term used to describe the process of managing digital identities and controlling what … [Read more...]

A Data Breach Detection and Prevention Solution – Lepide Data Security Platform

If your company stores personally identifiable information, or sensitive data of any kind, you’re going to need to have robust data security to ensure you are protected from insider threats, malware, rogue administrators and other data breaches. IT teams must implement third-party data breach detection and prevention solutions to detect, prevent and respond to potential security threats. Achieving … [Read more...]

Best Practices for Your Data Breach Incident Response Plan

All enterprises should have a data breach incident response plan in place to help minimize the damage caused by a cyber-attack. The plan should enable enterprises to recover in the shortest time possible, with the least amount of money spent, and damage caused to their reputation. The plan should include a list of processes that should be executed in the event of a breach and should also provide a … [Read more...]

Why Data Classification is Important for Security

These days, organizations store vast amounts of data. In fact, 65% of companies are collecting too much data, and are unable to find the time or the resources to analyze it. Not surprisingly, 54% of organizations didn’t know where all of their sensitive data is located. If businesses are unable to identify exactly what data they have and how it is being used, how are they supposed to protect … [Read more...]

What is a Data Breach?

In simple terms, data breaches can be defined as incidents where data (particularly sensitive, protected or confidential data) has been accessed, shared or otherwise exposed in an unauthorized way. The actual type of data involved in a breach might vary depending on the organization and the data they process. Many compliance regulations differ on what they define a data breach worthy of … [Read more...]