dcsimg

How LepideAuditor Can Help Companies Comply With CCPA

The California Consumer Privacy Act (CCPA) is a new data protection bill that will come into effect on the 1st of January 2020. The CCPA is designed to give Californian citizens more control over how their personal data is stored and processed. The CCPA applies to any for-profit company that collects, stores and trades personal data belonging to Californian residents. Under the CCPA, companies … [Read more...]

What Are Intrusion Prevention Systems and Can They Protect Your Network from Attacks?

Trying to understand what network security solutions are available, the differences between them, how and when they should be used, can be overwhelming for most organizations. While there are many options to choose from, a typical suite of tools would include an Intrusion Prevention System (IPS), Data Loss Prevention (DLP) software/hardware, and a sophisticated Data-Centric Audit & Protection … [Read more...]

Tips for Mitigating Data Breaches When Using Cloud Services

According to a recent report by McAfee, the average employee actively uses 36 cloud services at work, and a lot of the data that get stored using these services is sensitive (18.1%). Such data includes financial records, business plans, Social Security numbers, credit and debit card numbers, protected health information, and so on. The above figures highlight the importance of a tight … [Read more...]

Should You be Concerned About GDPR Fines?

The GDPR, which came into effect on May this year, has been off to a slow start, it would seem. As it stands, the largest fine issued by the Information Commissioner’s Office (ICO) was £500,000. Although Facebook came under a lot of fire over the data breach where Cambridge Analytica scraped the personal information of more than 50 million Facebook users, this happened before the GDPR came into … [Read more...]

How to Keep ePHI Out of the Wrong Hands, Whilst Ensuring Availability

Naturally, healthcare service providers were keen to switch from paper-based health records to electronic health records (EHRs), as doing so makes it a lot faster and easier to access patient data and improve patient care. However, healthcare service providers, including any third-parties they are affiliated with, need to find a way to balance the risks and rewards. According to a recent article … [Read more...]

Is it Possible to Prevent Data Breaches Caused by Insiders?

It’s no secret that businesses all over the world are struggling to tackle the security concerns posed by insiders. The insider threat is consistently found to be one of the biggest causes of data breaches for organizations of all shapes and sizes. If your security strategy focusses on building walls to stop external threats from getting in, then your security strategy is back to front. If you’re … [Read more...]

Aggregating & Auditing Data from Multiple Cloud Services Using a DCAP Solution

Accordingly to a recent report by rightscale.com, 93% of organizations are using cloud computing in some form or another. This is hardly surprising as cloud solutions are becoming increasingly more affordable and easier-to-use. These days, companies can actually save money by switching to the cloud, as they don’t need to manage and maintain their own infrastructure, which would require … [Read more...]

Naughty Microsoft: Are GDPR Fines Incoming?

Microsoft have secretly been collecting data on how people in the EU are using their Office products and sending it over to servers in the USA for storing, according to a report by the Dutch government. Even those with a rudimentary understanding of the GDPR can see that this is a fragrant breach of the regulations and could potentially lead to huge, multi-million-dollar fines. Basically, … [Read more...]

How DCAP Solutions Protect Your Company from Insider Threats

An increasing number of organisations are shifting their focus towards insider threat protection, which is hardly surprising given that the Ponemon Institute reported 3,269 insider incidents in the past year. According to a recent study by Kaspersky Lab, 52% of businesses admit that their own employees present the greatest risk to the integrity of their IT security posture. A data breach caused by … [Read more...]

4 Security Automation Tips for Your Business

IT environments are becoming increasingly larger and more complex. The growing BYOD trend means that employees are accessing their corporate network using a multitude of different devices, from potentially unsecured locations. Likewise, an increasing number of organizations are utilizing cloud services and virtualization technologies. SIEM solutions aggregate event logs from DLP, IDPS, UBA and … [Read more...]