dcsimg

10 Best Practices for Data Breach Prevention

Almost 15 billion data records have been lost or stolen since 2013 – an issue that affects North America disproportionately more than other parts of the world. Should a company fall victim to an effective data breach, it could result in a loss of reputation, and could incur heavy financial losses. According to the 2019 Cost of a Data Breach Report by the Ponemon Institute, the global average cost … [Read more...]

Why Data Classification is Important for Security

These days, organizations store vast amounts of data. In fact, 65% of companies are collecting too much data, and are unable to find the time or the resources to analyze it. Not surprisingly, 54% of organizations didn’t know where all of their sensitive data is located. If businesses are unable to identify exactly what data they have and how it is being used, how are they supposed to protect … [Read more...]

How to Detect a Data Breach

If we look at some of the most high-profile data breaches of the last few years, you will be astonished at how long it took for the organization involved to detect. Companies as big and as well-equipped as Verifone, took 6 months to detect the data breach that first started in the middle of 2016. It took Forever 21 around 9 months to detect their data breach that started in … Read more The … [Read more...]

Six Common Causes of Data Breaches

Data breaches are inevitable. If your organization stores sensitive data, then it’s likely you will experience a data breach at some point. The longer this data breach goes unnoticed, the more damaging it is likely to be to the reputation, bottom line and processes of your organization. If you’re serious about protecting data, then you need to know what a data breach is and be able to spot the … [Read more...]

What is Credential Stuffing and How Can We Prevent a Credential Stuffing Attack?

Credential stuffing is a type of cyber-attack where cyber-criminals steal login credentials from one system and try to use them to gain access to user accounts on another. This is only possible because people have a tendency to re-use login credentials on multiple websites and applications. Credential stuffing is becoming increasingly more popular, largely due to how simple and effective it is. In … [Read more...]

What is a Data Breach?

In simple terms, data breaches can be defined as incidents where data (particularly sensitive, protected or confidential data) has been accessed, shared or otherwise exposed in an unauthorized way. The actual type of data involved in a breach might vary depending on the organization and the data they process. Many compliance regulations differ on what they define a data breach worthy of … [Read more...]

How Lepide Addresses the Gartner Top 10 Security Projects for 2019

In February of 2019, Gartner published their list of the top 10 security projects for 2019 – a list of security projects that security and risk management leaders need to consider implementing in order to reduce risk and achieve compliance. As organizations grow and become more complex, the prospect of introducing new security projects whilst maintaining existing ones can be daunting. Brian Reed, … [Read more...]

15 Best Security Solutions and Practices to Improve Data Security

2019 is set for being the worst year on record for data breaches, with as many as 3,813 breaches reported so far. As a result, businesses can no longer cross their fingers and hope that they won’t fall victim to a breach, as the chances are, they will. Businesses who are responsible for the personally identifiable information of consumers will be likely subject to a major compliance … [Read more...]

Steps to a Successful Data Access Governance Program

Data Access Governance (DAG) is a broad term that refers to way we govern access to our data, if you haven’t already figured that out. Data Access Governance involves carrying out risk assessments, implementing privacy policies, discovering and classifying sensitive data, setting up access controls, and monitoring access to critical assets. It also involves analyzing inbound and outbound … [Read more...]

Security Flaws in S3 Buckets are Responsible for Many Data Breaches

For those that don’t know, an Amazon S3 bucket is a Simple Storage Service (S3), that is offered by Amazon Web Services (AWS) – the most popular cloud service in the world. S3 buckets are used by a number of high-profile service providers such as Netflix, Tumblr, and Reddit. They enable people to store large amounts of data at a relatively low cost, provide “99.99% availability”, … [Read more...]