dcsimg

Data Classification Software: 10 Things You Should Consider

Data Classification is a hot topic at the moment, with a flood of vendors on the market offering classification functionality standalone or as part of a more comprehensive data security platform. With all the competing vendors and information out there on data classification software, it can be difficult to know where to start. What is Data Classification? Simply put, data classification is the … [Read more...]

5 Forgotten Cybersecurity Best Practices

Data is the life-blood of most organizations nowadays, with the value often being compared to oil or gold. The intrinsic value of data, combined with the rapid increase in the volume of data being generated, has led to widespread increase in cybercrime. Attackers are evolving and improving their approach every day, and many organizations are struggling to keep up. It may even surprise you to learn … [Read more...]

Insider Threat: A Guide to Detect and Prevent Insider Threats

Whether you are a top-secret government branch, enterprise brand or a small business, insider threats should be top of your list of concerns right now. It doesn’t matter if you’re storing documents with market disrupting business plans, proof of alien life or even just a few credit card numbers; the value of data has grown exponentially over the last 5 years. You may think that your employees … [Read more...]

How Can Hospitals Protect Themselves from SamSam Ransomware Attacks?

A strain of ransomware called SamSam was released towards the end of 2015 and continues to pose a serious threat to organizations of all sizes. Unlike other forms of ransomware, SamSam is very targeted and frequently updated in order to circumvent anti-virus tools and endpoint protection solutions. SamSam is even able to delete backups – one of our primary safeguards against ransomware attacks. … [Read more...]

Incident Response Plan – A 7 Step Guide

All enterprises should have an incident response plan in place to help minimize the damage caused by a cyber-attack. The plan should enable enterprises to recover in the shortest time possible, with the least amount of money spent, and damage caused to their reputation. The plan should include a list of processes that should be executed in the event of a breach and should also provide a clear … [Read more...]

How is a UEBA Solution Different to a SIEM Solution?

As we are consistently told by numerous Data Breach reports, insider threats are one of the biggest security concerns for enterprises all over the world. The damage that a rogue admin, for example, can cause in your environment is immeasurable. Often, insider threats are difficult to detect and can go undetected for years. User and Entity Behavior Analytics (UEBA) is often referred to as an … [Read more...]

How to Secure Your Data When Working with Remote Teams

Over 80% of senior executives agree that the risk of a data breach is higher when employees work remotely, according to a report by Shred-it. Devices and documents containing sensitive data may get lost or stolen, malware can enter the network via USB drives, and credentials can be stolen from public computers, to name a few of the myriad of threats we may encounter when working with remote teams. … [Read more...]

Schools Report an Increase in Security Incidents Since GDPR Came into Effect

According to recent data published by SchoolsWeek, schools across the UK have seen a 43% increase in the number of reported data security incidents since the GDPR came into effect. According to the ICO, there were 511 reported incidents during the second quarter of 2018, which implies that schools are failing to keep up to speed with the latest cyber-security trends. However, it should be noted … [Read more...]

A Quarter of NHS Trusts Have Zero Staff Who are Versed in Security

According to a Freedom of Information Request submitted by Redscan – a penetration testing firm, approximately 25% (24 out of 108) of NHS trusts who responded to the request have zero qualified security personnel. However, some trusts have stated that they are in the process of training security staff. According to Redscan, trusts have spent an average of £5,356 on security training in the … [Read more...]

The Greatest Mobile Security Threats Facing Enterprises

As more companies embrace the growing BYOD trend, many have started issuing mobile devices to their employees to give them more flexibility over how, when and where they can carry out their duties. However, in doing so they are opening up a number of additional security risks. The first, and most obvious risk, relates to the way employees use their devices outside of the workplace. Should an … [Read more...]