Why the Real Estate Industry Could Do More to Secure Data

When it comes to cyber-attacks, the real estate industry rarely makes the headlines. Yet, real estate companies deal with high value transactions on a daily basis and are frequently targeted by hackers. Not only that, but despite storing and processing large amounts of financial data, real estate firms are not bound by any industry-specific data protection regulations, such as HIPAA, PCI and SOX, … [Read more...]

Keeping Unstructured Sensitive Data Secure in the Cloud

77% of companies use at least one cloud-based service, according to an article by Forbes, and it’s inevitable that the adoption of cloud solutions will continue to grow. Why? Because cloud services are scalable, flexible, easy-to-use, and can save businesses money in the long-term. However, cloud services present a number of security issues relating to the way data is accessed and used, … [Read more...]

Why Are Business Email Accounts So Valuable to Hackers?

2019 has been touted as the “worst year on record” for data breaches, with the number of breaches already up by 54%, according to a new report by Cyber Risk Analytics. Compromised email accounts account for 70% of stolen data, with passwords accounting for 64%. The majority of attacks targeted the business sector, and were initiated by malicious outsiders, who typically seek to exploit … [Read more...]

Insurance data security laws skirt political turmoil

Across the United States, a unique approach to lawmaking has proved radically successful in making data security stronger for one industry—insurance providers. The singular approach has entirely sidestepped the prolonged, political arguments that have become commonplace when trying to pass federal and state data privacy laws today. In California, for example, Big Tech lobbying groups have … [Read more...]

5 Tips for Managing Your Data Loss Prevention (DLP) Strategy

Data loss prevention (DLP) is a broad term that refers to a collection of techniques designed to prevent sensitive data either falling into the wrong hands or being corrupted in some way. Such techniques include controlling and monitoring access to sensitive data, and any devices/networks that store the data. While firewalls, IDPS and anti-virus solutions are useful for analysing and restricting … [Read more...]

New Survey Reveals the Importance of Cybersecurity Automation

These days enterprises are dealing with vast amounts of unstructured data – a problem that is compounded by the increasing number of ways to share this data. Despite this, both employers and employees are still failing to either understand or care about their responsibilities when it comes to data protection. According to research carried out by Opinion Matters – an independent … [Read more...]

How to Build a Data Classification Policy to Improve Data Security

Data classification is often seen as the starting point in many data security strategies, especially if your organization is growing and collecting large volumes of data. The reason for this, is that you cannot accurately focus your cybersecurity strategy if you do not know where your most sensitive data resides. How can you ensure appropriate access controls and monitor user behavior effectively … [Read more...]

10 Ways to Prevent Phishing Attacks

Phishing scams are one of the most common methods of attack you’re likely to come across. They are a hugely profitable attack method for cybercriminals, as thousands fall victim to them every year. Fortunately, due to their commonplace nature, phishing scams are avoidable if you know how to correctly identify and prevent them. Here are 10 simple steps to identifying and preventing phishing scams … [Read more...]

Six Office 365 Best Practices for Better Security

If you’re a small business or even an enterprise organization using Office 365, cyber-criminals, hackers and opportunist insiders could be targeting potential weaknesses in your security right now. To combat these threats, we’ve put together this list of six best practices to help you improve the security of your Office 365 environment. The best practices in this blog will primarily focus on … [Read more...]

Using Deception to Fight Cyber-Crime

Deception technologies, often referred to as Decoys, Honeypots, and Red Herrings, are assets that have been specifically setup to attract, deceive and discourage cyber-criminals. Such assets may include anything from servers, files, databases, applications, emails, user accounts, unused IP addresses, and so on. When these assets are accessed in some way, a real-time alert is sent to the … [Read more...]