dcsimg

How to Sell Cybersecurity to Business Owners

Most business leaders are not experts in data security, or any IT-related field for that matter. Their attention is typically focused on streamlining business operations in order to maximize profits. If they can avoid spending money on endeavors that are unlikely to yield any kind of ROI, they will. Face it, data protection doesn’t typically yield any noticeable returns. It’s simply … [Read more...]

Top 10 Tips for Securing Your Data While Working Remotely

The social distancing measures introduced by Governments across the globe in an attempt to prevent COVID-19 from spreading, have resulted in significantly more people working from home. This has inadvertently opened up a can of worms, as most companies are woefully unprepared to secure a mobile work force. Remote workers are not only more likely to put their own privacy at risk, but they are more … [Read more...]

The Challenge COVID-19 Is Posing to Businesses Worldwide

The spread of Coronavirus and the associated illness, COVID-19, is all anybody is talking about right now – and for good reason. COVID-19 is changing the way enterprises are operating, forcing many employees to work from home in a bid to practice social distancing and limit the spread of the disease. The full effects of the pandemic to businesses and the general public are yet to be realised, with … [Read more...]

What is Data Loss Prevention (DLP)? Tips and Best Practices

With the ever-increasing amount of data that companies collect from customers and the changing threat landscape, it’s important to make sure that personally identifiable information (PII) is safeguarded so that it doesn’t end up in the wrong hands. Data breaches are hitting the headlines more frequently and can result in major reputational damage and large fines from data commissioners and … [Read more...]

What are Open Shares and How Fixing Open Shares Can Help Improve Data Security

Having data open to everyone is a sure-fire way of leaving yourself exposed to potential data breaches or privilege abuse. Unfortunately, many organizations seem to be making the same mistake when it comes to open shares. Fixing open shares can help improve data security, and in this blog, we will find out how. What Are Open Shares? An “open share” is a resource that is accessible to … [Read more...]

The Lepide Guide for Managing and Monitoring Access Control

The ability to determine who should and shouldn’t have access to what data, is an integral part of any data security strategy, or at least it should be. Unfortunately, many organizations still don’t have the control that they need to keep their data secure. Many don’t have a complete inventory of what data they store, let alone a clear understanding of how that data is being … [Read more...]

How to Detect a Data Breach

If we look at some of the most high-profile data breaches of the last few years, you will be astonished at how long it took for the organization involved to detect. Companies as big and as well-equipped as Verifone, took 6 months to detect the data breach that first started in the middle of 2016. It took Forever 21 around 9 months to detect their data breach that started in … Read more The … [Read more...]

15 Best Security Solutions and Practices to Improve Data Security

2019 is set for being the worst year on record for data breaches, with as many as 3,813 breaches reported so far. As a result, businesses can no longer cross their fingers and hope that they won’t fall victim to a breach, as the chances are, they will. Businesses who are responsible for the personally identifiable information of consumers will be likely subject to a major compliance … [Read more...]

What is Personally Identifiable Information (PII) Data and How Do You Classify and Secure it?

Personally Identifiable Information (PII) is commonly defined as “any data that could potentially identify a specific individual”, and can be either sensitive or non-sensitive. Sensitive PII is information which, when disclosed to an unauthorised entity, could result in harm to the data subject. Disclosure of non-sensitive PII, on the other hand, will result in little to no harm to the … [Read more...]

Why the Real Estate Industry Could Do More to Secure Data

When it comes to cyber-attacks, the real estate industry rarely makes the headlines. Yet, real estate companies deal with high value transactions on a daily basis and are frequently targeted by hackers. Not only that, but despite storing and processing large amounts of financial data, real estate firms are not bound by any industry-specific data protection regulations, such as HIPAA, PCI and SOX, … [Read more...]