Teaching Staff To Respect The Risk Of A Data Breach

Read Karin Ratchinsky’s article about why companies should teach their employees about the data breach risks on Information Security Buzz : Last year was another one characterized by constant, confusing, and highly consequential data breaches. At this point, all organizations need to take this persistent threat seriously. Yet research by the Ponemon Institute reveals that just […]

Users take the cheese to solve data breaches

Cheese Movers International’s restructuring resulted in some employees being unhappy with either their new role or the new management. And unhappy employees, especially those who know the system well and have access, can become major problems for companies. Read about the new Verizon’s recently released annual breach report and its surprising conclusions on CSO Online.

Lack of IoT security could be our downfall

Read why Rick Delgado says that lack of Internet of Things security could be devastating for businesses on Beta News : Just as healthcare providers need PALS certification to keep up with new discoveries and advancements in medicine, individuals who work in IT need to become recertified with data security measures. One particular area in need […]

5 Data Breach Threats Your Small Business Should Prepare For

Securing sensitive information has never been more difficult with new malware threats that seem to pop up every single year. Data breaches affect even the most renowned companies like Yahoo, LinkedIn and Dropbox, to name a few. Read more about the five data breach threats small and medium businesses should prepare for on Business News […]

It’s ‘Code Red’ as cyber-security pros gather

Cybersecurity threats are now a household worry, putting the thousands of professionals who flock to the annual RSA cybersecurity conference here in an unusually influential position. “The threat level is now Code Red,” said Avivah Litan, a security analyst with Gartner, a consulting company. Familiar threats, such as hacking by groups backed by governments, are not […]

Exclusive: Mimecast Report Indicates Cybersecurity Lags Behind Both Perceived Threat And Real Damage

Corporate cybersecurity has not kept up with either perceived security threats or damage resulting from security failures according to a report released today by Mimecast, an email security company. The Mimecast report combines the results of their Email Security Risk Assessment (ESRA) with a survey on corporate cybersecurity carried out in partnership with Vanson Bourne. […]

Cyber warriors see politics muddying security efforts

President Donald Trump has vowed to improve cyberattack defence, but security experts meeting this week say a fractious domestic and international political landscape could hamstring efforts to improve internet security. As the White House mulls an executive order on cybersecurity to combat an epidemic of data breaches and hacks, participants at the annual RSA Conference voiced […]

Integrating security management into broader building systems

Read  Gert Rohrmann’s article about integrating security management into broader building systems on Source Security : Security solutions should be about integration not isolation. Many organisations are considering their existing processes and systems and looking at how to leverage further value. Security is part of that focus and is a central component in the move […]

Credit monitoring services can mitigate effect of data breach, says expert

Read Philip Kemp’s article about how credit monitoring services can mitigate the effect of a data breach on Out-Law : Providing credit monitoring services can help reduce the reputational damage that businesses can suffer when customer data is compromised in a cyber attack, and it has also been shown to help reduce the level of fine […]

New Mandatory Data Breach Laws for Australia – what does it mean to organisations trading in Australia?

Read Mark Vincent explain the new Australian data breach notification law and what it means to companies having businesses in Australia on Lexology : A data breach arises where there has been unauthorised access to, or unauthorised disclosure of, personal information about one or more individuals, or where such information is lost in circumstances that are […]