What is Malware? A Definition & Tips for Malware Prevention
Learn how to recognize and defend against malware attacks in Data Protection 101, our series on the fundamentals of information security.
EHR Vendors: The Next Target for Healthcare Hackers?
Hackers have already put hospital networks and insurers on notice that they’re interested in the health data they protect. Electronic health record vendors may be next.
Staying Secure While Staying Connected
With users reportedly spending an average of 162 minutes on their mobile device every day, the amount of personal information communicated can be a treasure to a hacker. Read on to learn how to use mobile devices and the web securely and privately.
What is Cloud Account Hijacking?
Learn more about the risks of cloud account hijacking and methods to prevent sensitive data loss in the cloud.
Recent Breaches, Alerts Call for Improved Defense Against POS Malware
Cyber attacks relying on POS malware have made a major resurgence – read on to learn about some new developments and incidents involving POS malware as well as tips for protecting POS systems against data breaches.
Cryptography in the Cloud: Securing Cloud Data with Encryption
Don’t sacrifice security for the convenience of cloud computing – learn how to apply encryption methods to ensure that data stays safe in the cloud.
5 Questions to Prepare for Your Next Security Audit
Use these five questions to gauge your audit readiness and prepare to demonstrate your security posture to corporate clients.
BYOD Security: Expert Tips on Policy, Mitigating Risks, & Preventing a Breach
30 data security experts discuss the best policies on BYOD and how to prevent a breach.
How to “Time-bomb” a Confidential File with Digital Guardian Secure Collaboration
This is the second installment in our How-To series: an ongoing set of product posts full of tips and tricks for getting the most out of Digital Guardian Secure Collaboration.
What is an Advanced Persistent Threat? APT Definition
Learn about advanced persistent threats, including how they work and how to recognize signs of an APT attack.
Don't Fall Behind
Get the latest security insights
delivered to your inbox each week.
Thank you for subscribing!