Thursday , 23 November 2017
Home » Tag Archives: Protection

Tag Archives: Protection

Protect Your Privacy with Webcam Protection

Today’s smart home is defined by the number of smart and internet-connected devices that work either together or individually to allow users to remotely control or automate various features for efficiency or convenience. The number of IoT devices per household has increased significantly over the past couple of years, reaching an estimated 11 smart devices/accessories per home, according to a ... Read More »

EMEA businesses turn to public cloud in spite of security doubts

Businesses in EMEA are increasing their investment in public cloud, despite ongoing security concerns and a perceived lack of understanding about who is responsible for keeping their data safe, according to the findings of a study of IT decision makers released today by Barracuda Networks, Inc. (NYSE: CUDA), the leader in Cloud-enabled security and data protection solutions.   Key findings: ... Read More »

As GDPR deadline looms, time for compliance is running out

GDPR is a game-changing piece of data protection legislation that goes into effect on May 25, 2018. While the legislation includes various components related to how organizations collect, store, manage and protect customer data, the ‘right to be forgotten’ gives individuals the right to have personal data erased. If most organizations cannot locate where their customer data is stored, it will ... Read More »

Don’t be a fool about endpoint protection

Kurt Wescoe, Chief Architect,
Wombat Security Technologies

In the U.S., 35 percent of working-age adults do not know what phishing is. Considering the average office worker can see up to one risky email a day, that’s quite alarming. Clearly, this awareness gap is putting both business data and systems at risk. Factoring end users into the endpoint protection equation just makes sense. Discussions about phishing prevention are ... Read More »

How to Protect Yourself or Organization from Malware

Ransomware is one of the most infuriating kinds of cyber attack that’s cropped up over recent years, with hackers raking it in from hapless comouter users who just want their files back. Whilst we all hope for a perfect online community where such things wouldn’t happen, it’s evident that future is a long way away. So the team at AppRiver have ... Read More »

Adopting a User-Centric Approach to Protect Sensitive Data

Phil Turner,
Okta

The world has changed. With more users accessing data outside the corporate firewall and from mobile devices, businesses can now allow for more flexible work environments. But this increased access has also brought an upsurge in the risk of data breaches and threats from hackers. Recent high-profile breaches have heightened overall market awareness of security, not just within the CSO ... Read More »

Adopting a User-Centric Approach to Protect Sensitive Data

Phil Turner,
Okta

The world has changed. With more users accessing data outside the corporate firewall and from mobile devices, businesses can now allow for more flexible work environments. But this increased access has also brought an upsurge in the risk of data breaches and threats from hackers. Recent high-profile breaches have heightened overall market awareness of security, not just within the CSO ... Read More »

Navigating the GDPR minefield: Becoming compliant

Rick Orloff,
Code42

The General Data Protection Regulation, or GDPR as it is more commonly known has been dubbed a landmark ‘win’ for data protection policy within European businesses. Replacing fragmented and disparate country-specific rules, the GDPR will set the standard for data protection across all 28 countries within the European Union. As it comes into force on the 25th of May 2018, ... Read More »

£10k on offer for hackers who can beat Bromium

This year’s InfoSecurity Europe, taking place in London between the 7th and 9th of June, has just gotten a bit more exciting as Bromium, a leading endpoint security provider, has put a £10k prize up for anyone who can successfully compromise a system protected with their renowned security technology. Attendees are invited to bring the most destructive, devastating malware into ... Read More »

Customer Trust and Revenues are where DDoS hits hardest

Corero Network Security has unveiled research from this year’s RSA showing that the most damaging consequence of DDoS attacks is the loss of customer trust. After polling tech decision makers at RSA, Corero also foud that 34% of respondents felt loss of revenue was the biggest threat. Dave Larson, Coerero’s chief operating officer, informed us that ‘network or website service ... Read More »