There are a variety of threats that IT faces all the time, but the ones that could be most tricky to deal with are usually those that originate in-house. Whether it’s careless users putting systems at risk or malicious ones taking advantage, these insiders can cause serious damage to their organizations.
According to a recent study, companies are facing threats that they feel their technological defenses may not be capable of matching. Here’s what it means for you. EIQ Networks surveyed IT decision-makers to see how they felt their defenses stood up to modern threats. Many had some reservations about users’ ability to defend systems, and the […]
It’s only natural: Following a major security breach, IT is going to be pretty concerned that they could be next. And judging by increases in spending, plenty of decision-makers are worried as well.
All too often, we don’t actually get a look into how companies store and organize their data until there’s a high-profile breach that comes to light. A recent study looks to shed some light on how this crucial IT practice is handled.
Storing and transferring data has never been easier for workers – or more dangerous. Here is a sample policy you can build off of in order to set rules and best practices for how users can transfer sensitive information without letting it fall into the wrong hands.
Workers saved company information to a thumb drive, then quit to start a rival business. Their former employer sued. The outcome shows why safe data transfer policies are important and must be clear.
Verizon has released a wide-reaching report on the state of data breaches. And while it covers a lot of territory, one area in particular, cyber espionage, is showing clear growth – among other troubling developments.
Target’s data breach has a lot of folks wondering: How much would a major cyber incident cost our organization? And are there any ways we could drastically cut the costs of a fallout? Unfortunately, the answers might be: a lot, and don’t count on it.
Threats to your company’s systems are always out there – from scammers, to hackers, to data breaches and outages. But when it comes to preparing for these incidents and their fallout, many companies take the approach of “we’ll deal with it if it comes up.”
Data encryption is on a lot of IT pros’ minds these days. It’s also on a lot of their to-do lists. But when push comes to shove, far too few have taken the plunge and made it a priority.