Excessive employee permissions expose SMES to insider threats

Varonis Systems, Inc., a provider of software solutions that protect data from insider threats and cyberattacks, reveals the results from the Varonis Data Risk Report, showcasing an alarming level of exposure for corporate and sensitive files across organisations, including an average of 20 per cent of folders per organisation open to every employee. Read about […]

Technology alone may not curb insider threats

Read why Mark Pomerleau says that technology alone may not let companies curb insider threats on C4ISR Net : Oftentimes more frustrating to the U.S. government than the threat of an emboldened Russia or Chinese economic espionage is the trusted insider. Insider threats have disclosed and improperly removed troves of sensitive information from government networks that […]

Small businesses increasingly in cybercriminal crosshairs

Read why Dwight Davis says that small and medium businesses are increasingly coming under attacks from cyber criminals on CSO Online : Even if they envied the big budgets, global reach and market presence of big corporations, small business operators could console themselves with at least one silver lining: compared to their big brethren, small- […]

Why combatting cyber-crime is critical for life science companies

Read why Helen Davenport, Josh Hanet and Patrick Duxbury say that it very important for healthcare firms to continue combating cyber crime on Lexology : Biotech and pharmaceutical firms hold vast amounts of valuable data and information making them prime targets for cyber-attacks – so how are they protecting themselves? In the American political thriller series, […]

Staying Cyber Safe: How to Protect Your Small Business

Read Asher De Metz’s  article about how small and medium businesses can protect themselves against cyber attacks on Data Center Journal : Small businesses have flourished in the digital age, with the Internet providing a host of opportunities to promote their products, expand their customer base and streamline their services. But this increased exposure also […]

How can CIOs best secure the future of their company data?

Read about how CIOs can best ensure data protection on The C-Suite : 2016 saw a consistent flow of warnings from cyber security experts, who expressed their concern that come 2017, businesses will be subject to a significant rise in data breaches, which will far outstrip the number of reported cases in 2016. Read the […]

Public and private partnerships help fortify critical infrastructure

Building public and private partnerships is imperative to protecting a country’s critical infrastructure, according to Steven Gutkin, deputy director at the New Jersey Office of Homeland Security and Preparedness. Gutkin spoke with SearchCIO at the recent Fusion CEO-CIO Symposium, produced by WTN Media. Read the interview with Steven Gutkin, deputy director at the New Jersey Office […]

‘Sizable Proportion’ Of U.K. Businesses Have No Formal Approach On Cyber Security

Read Dina Medland’s article about why United Kingdom businesses top the cyber attacks charts on Forbes : The U.K. government could be forgiven rising levels of frustration when it comes to the approach taken by many businesses on cyber security. Although three in ten (31%) now say it is a “very high” priority for their senior […]

Profiling The Insider Threat – Breaking Down a Complex Security Term

Read Dr Jamie Graves’ article about how to deal with insider threats on Infosec Magazine  : From a disgruntled employee looking to destroy IP, or an opportunist looking to make money by selling data, all the way to a security-naïve worker that might unwittingly let criminals into your network without knowing it, there are dozens of […]

How to Prevent Costly and Dangerous Cyberattacks

Read Greg A. Hood’s article about how businesses can prevent costly and dangerous cyber attacks on Medscape : There are two types of practices: those that have been hacked, and those that probably will be hacked. Large and small practices are vulnerable to data breaches. However, many resources are available to thwart an attack, and […]