3 simple IT mistakes that caused a breach of 800,000 records

A high-ranking IT official in Utah recently resigned after “human error” led to a massive data breach affecting hundreds of thousands of people in the state. Here’s what went wrong. 

3 common data encryption myths

To IT professionals, using encryption for sensitive data is common sense. But organizations often don’t implement the technology, in part because users and decision makers still believe these myths about data encryption: 

Less than half of small businesses verify cloud providers’ security

Many IT security experts agree that cloud computing providers could be doing more to protect their customers’ data. But that doesn’t mean customers don’t have their own responsibilities when it comes to cloud security. 

Employee loses USB drive containing nuclear safety report

Officials in England recently saw firsthand the information security dangers created by employees’ portable USB drives. 

Lesson learned: Don’t keep encrypted drive and password in the same place

Encrypting data and setting a strong password are two keys to protecting information security. But here’s an easy way to make both those security measures completely useless: 

5 keys to secure USB drives

USB drives and other portable storage devices pose a number of information security threats to organizations – here’s what IT can do about it. 

Organizations use data recovery services that jeopardize security, study says

Data recovery services are often used in an emergency – for example, when a drive fails and the data must be recovered ASAP. However, a new study suggests the need to get recovery done quickly leads many companies to put their data in the hands of third-parties that jeopardize its security. 

The overlooked security threat that could cost businesses $2.5 million

USB drives can boost productivity by allowing users to bring work data with them wherever they need it. But those drives’ portability also makes them a big security risk that IT must deal with.

5 key security steps most businesses skip

Even as cyber-attacks become more frequent and sophisticated, there are several steps every IT department can take to reduce the risk for their organization. The problem: Most of them fail to take those precautions.

Protect your data from third-party vendors’ vulnerabilities

IT pros don’t just need to worry about data breaches on their own company’s network – they also must protect data that’s stored by third-party vendors.