dcsimg

Is Data Security Essential or Optional in Today’s New World?

Few industries have fared well during the corona virus pandemic. As you would expect, most of the industries that have either stayed afloat or managed to capitalize on the crisis were those that generated a significant portion of their revenue from online sales. Online shopping, food delivery services, entertainment, gaming, e-learning, dating, and videoconferencing, were amongst the industries … [Read more...]

How to Build a Business Case Proposal for Information Security

Confidential data is at risk, and the threats to data are likely to increase over the next 12-18 months. At present, analytics predict that there is a 40% chance that any organization could fall victim to an insider threat if proper actions are not taken to improve prevention, detection and response capabilities. Why then, do so many security professionals struggle to get budgets approved for … [Read more...]

How Infonomics Can Help You Determine Your Security Budget and Assess Your Financial Risk

Data is the lifeblood of any organization, yet many CISOs still struggle to convey the financial risks associated with the loss or theft of that data. Data breaches continue to dominate the headlines with alarming regularity and new the challenges arising from global shifts in work habits are creating a growing number of risks that organizations have to deal with. These new challenges bring with … [Read more...]

How to Sell Cybersecurity to Business Owners

Most business leaders are not experts in data security, or any IT-related field for that matter. Their attention is typically focused on streamlining business operations in order to maximize profits. If they can avoid spending money on endeavors that are unlikely to yield any kind of ROI, they will. Face it, data protection doesn’t typically yield any noticeable returns. It’s simply … [Read more...]

Top 10 Tips for Securing Your Data While Working Remotely

The social distancing measures introduced by Governments across the globe in an attempt to prevent COVID-19 from spreading, have resulted in significantly more people working from home. This has inadvertently opened up a can of worms, as most companies are woefully unprepared to secure a mobile work force. Remote workers are not only more likely to put their own privacy at risk, but they are more … [Read more...]

The Challenge COVID-19 Is Posing to Businesses Worldwide

The spread of Coronavirus and the associated illness, COVID-19, is all anybody is talking about right now – and for good reason. COVID-19 is changing the way enterprises are operating, forcing many employees to work from home in a bid to practice social distancing and limit the spread of the disease. The full effects of the pandemic to businesses and the general public are yet to be realised, with … [Read more...]

What is Data Loss Prevention (DLP)? Tips and Best Practices

With the ever-increasing amount of data that companies collect from customers and the changing threat landscape, it’s important to make sure that personally identifiable information (PII) is safeguarded so that it doesn’t end up in the wrong hands. Data breaches are hitting the headlines more frequently and can result in major reputational damage and large fines from data commissioners and … [Read more...]

What are Open Shares and How Fixing Open Shares Can Help Improve Data Security

Having data open to everyone is a sure-fire way of leaving yourself exposed to potential data breaches or privilege abuse. Unfortunately, many organizations seem to be making the same mistake when it comes to open shares. Fixing open shares can help improve data security, and in this blog, we will find out how. What Are Open Shares? An “open share” is a resource that is accessible to … [Read more...]

The Lepide Guide for Managing and Monitoring Access Control

The ability to determine who should and shouldn’t have access to what data, is an integral part of any data security strategy, or at least it should be. Unfortunately, many organizations still don’t have the control that they need to keep their data secure. Many don’t have a complete inventory of what data they store, let alone a clear understanding of how that data is being … [Read more...]

How to Detect a Data Breach

If we look at some of the most high-profile data breaches of the last few years, you will be astonished at how long it took for the organization involved to detect. Companies as big and as well-equipped as Verifone, took 6 months to detect the data breach that first started in the middle of 2016. It took Forever 21 around 9 months to detect their data breach that started in … Read more The … [Read more...]