Friday Five 12/2
World Cup scams and other international cybercrimes took the headlines this past week. Read about these threats and more in this week’s Friday Five!
World Cup scams and other international cybercrimes took the headlines this past week. Read about these threats and more in this week’s Friday Five!
LockBit may have taken a hit this past week, but that hasn’t stopped ransomware from making the headlines. Catch up on this and more in this week’s Friday Five!
Different types of data breaches will affect what type of protection you implement at your company. Understanding each can help you better prepare for an attack.
The most common types of data breaches are:
How long do you have to report a data beach? In many scenarios it depends what state your organization resides in.
Files and documents are the primary tools for chronicling and sharing information.
Enterprise file sharing, or enterprise file sync and sharing (EFSS), can help secure your documents and data when shared throughout your company.
Different types of file sharing include the following:
PII requires protection for both legal and reputational reasons, but if a data breach occurs, will your company still be able to protect this sensitive data?
Recently proposed amendments to the NYDFS Cybersecurity Regulation would demand new technological enhancements, audit and risk assessment requirements of companies.
Having a Digital Rights Management tool can help your team collaborate in the cloud while meeting compliance needs and adhering to your organization's data security policies.