Yet another lesson from the Ashley Madison hack: If you’re counting on encryption of sensitive data to save the day, you may wind up regretting that decision.
Part of an effective IT security program for most businesses should be protecting online transactions with customers. In this guest post, Anand Srinivasan describes some of the website security keys businesses should keep in mind.
Businesses are leaving a lot of information open to cyber attackers. And that’s leading to IT security incidents with some serious financial consequences.
Allowing users to carry sensitive data on a portable computing device creates a certain amount of risk. But here’s a data breach that occurred because several pieces of IT equipment were stolen from an employee’s car.