dcsimg

The Two Biggest Repercussions A Data Breach Will Have on Your Business

According to recent studies, since 2013 there have been over twice as many records that have been stolen or lost than there are humans on the earth. Statistics like this should be shocking, but many find it difficult to quantify what this means in real business terms. With this in mind, it’s important to take a step back and look at the tangible effects that breaches in cybersecurity could … [Read more...]

The Financial Services Industry is Seeing an Increase in Reported Data Breaches – Why?

It’s becoming common knowledge that cyber-crime is on the rise. According to the Annual Cost Of Cybercrime Study by the Ponemon Institute and Accenture, in the last 5 years we have seen 67% increase in the number of reported data breaches. The banking sector continues to be the #1 target for cyber-criminals with the average annual cost of cybercrime estimated to be over $18 million. … [Read more...]

How to Detect and React to Insider Threats Without a SIEM

Insider threats are one of the biggest threats to the security of your data. Recent statistics suggest that insiders are responsible for 28% of all data breaches. Whilst this may not seem like a huge number compared to the external threats, it is significant. External attacks, such as phishing attacks, are a hit and hope method where attackers send out millions of emails in the hope of … [Read more...]

4 Predictions for Healthcare Data Security in 2019

The healthcare industry has been subject to a paradigm shift when it comes to managing confidential patient data. The digitization of health information, which was initially driven by the HITECH Act of 2009, has provided a number of benefits, such as providing more efficient access and storage, requiring less employees to manage the records, as well as providing more accuracy and readability. … [Read more...]

How the GDPR Can Benefit Organizations in the USA

With the one-year anniversary of the General Data Protection Regulation (GDPR) just passed, it’s interesting to see whether the climate of fear, uncertainly and doubt that pervaded the cybersecurity ecosystem was justified. Serious questions were being asked about whether companies could get themselves ready for the compliance mandate, and whether business-crippling fines would be handed out to … [Read more...]

5 Ways to Improve SharePoint Security

SharePoint is an increasingly popular platform due to its powerful collaborative capabilities. Many organizations use SharePoint to store, organize, share and access information from any device. Because of its collaborative capabilities, SharePoint faces different security concerns than other platforms. Maintaining SharePoint security must be a collaborative effort between the IT team and the end … [Read more...]

How LepideAuditor Compliments Privileged Access Management (PAM)

Privileged Access Management (PAM) solutions help organizations to control and restrict permissions within their Active Directory. When used correctly, PAM solutions enable you to centralize privileged credentials to ensure a higher level of security around sensitive data, control access to that data and monitor suspicious behavior. Privileged Access Management solutions on their own, however, … [Read more...]

California Consumer Privacy Act (CCPA) vs. GDPR: What’s the Difference?

Data security and data privacy regulations are increasing in number, strictness and complexity year upon year. For many governing bodies, the necessity for data protection and the privacy of the individual is a major priority. Any organization that deals with sensitive information (Personally Identifiable Information or other confidential data) is likely to fall under one or more of these … [Read more...]

Why Data Security Should Start from the Inside Out (and How to Do It)

When we speak about data security to our customers, we always advise them that they need to build from the inside out, instead of from the outside in. The most important part of your organization, which for most is the data itself, is the asset that needs to be protected as a priority. When a new bank is planned and built, it isn’t designed around the floorplan or that existing … Read … [Read more...]

3 Traits Shared by Successful CISOs

In episode 8 our popular podcast series, CISO Talks, we spoke with a specialist IT recruiter and asked what the role of CISO entails and how to be successful. First, a little clarification. The role of a CISO will vary dramatically depending on the size of the organization and the industry you are in. A CISO in the tier one investment bank, for example, may be under a lot more … Read … [Read more...]