The digital world has become a scary place, one in which few small- and medium-sized businesses (SMBs) feel that they are adequately protected. Jeremy Wittkop, CTO of InteliSecure, outlines the steps necessary to achieve effective information security through identification and prioritization of key assets most important to a business.
For organizations, the average total cost of a data breach is over $3 million. For employees or customers, the cost is a loss of privacy, identity theft, and immediate or future monetary loss. Here's why automation is the core of data protection and why it should be a business priority this year.
With May 25 looming, preparing for compliance with the European Union (EU) General Data Protection Regulation (GDPR) is an unavoidable necessity for businesses – and an important act of social responsibility.
Mobile Apps are used every day without a second thought. But convenience comes at a cost. You may want to think twice before you download.
As of writing this article on Thursday, September 7th, 2017, yet another corporate mega-breach has been revealed and this time it's the credit-reporting agency, Equifax. Negligence, terrible communications, bad crisis management … someone's head is gonna roll.
When it comes to thinking about cyber-attacks, many of the folks running businesses are relying on a heavy combination of faith ("it won't happen to us"), reliance on cyber-insurance ("any losses will be covered"), and the unfounded belief that the long-term consequences won't be that bad ("if it does happen, we'll be back in business in no time"). Alas, every single one of those ideas is simply wrong.
As the issue of IT threats loom over the unprotected, there are several steps the legal industry can take to ensure critical case data remains intact and accessible. Expert Derek Brost shares some of those tips with us today.
Modern enterprise is a perpetual tug-of-war between security and convenience. And the latter is winning. What’s an administrator to do?
Xuan Zhao, a female data scientist in the information security industry, explains how machine learning dramatically helps her work have a true impact on society, and vice versa.
Before rushing headlong into the Internet of Things, it's good to know what happens to the data that all those connected devices collect--and how to protect it.
Privacy and data protection expert Elena Elkina shares her remarkable story of a how a life behind fences and daily phone taps in Cold War Russia pushed her on a quest to not only find her own identity, but into a career in the privacy field.