What is a Phishing Attack? Defining and Identifying Different Types of Phishing Attacks
Learn about the different types of phishing attacks as well as how to recognize and avoid falling victim to phishing scams in our series on the fundamentals of data protection.
Shoring Up Security for Small to Midsize Businesses
Cyber attacks don’t just impact large enterprises – small to medium-sized businesses have become a prime target for malicious actors looking to steal data for personal gains. Read on to learn about the threats facing SMBs and tips for how to protect against them.
Data Leak Prevention Tools: Experts Reveal The Biggest Mistake Companies Make Purchasing & Implementing Data Leak Prevention Software
Due to their size, enterprises have many security issues to consider when establishing a comprehensive data security strategy. One security need that is especially critical for larger companies - because they typically have many employees and large volumes of sensitive data - is proper data leak prevention.
What is Insider Data Theft? Data Theft Definition, Statistics and Prevention Tips
Learn about insider data loss and get tips for preventing data theft in Data Protection 101, our series on the fundamentals of data security.
Enterprise Oversharing: The Huge Security Risk Nobody Talks About
Vulnerable application servers aren’t the only source of juicy information about your company. Your web site and employees may be telling would-be thieves and criminals all they need to know to attack you.
What is Device Control? A Device Control Definition
Learn about device control technology and how to implement device control solutions in your security program.
Law Firm Data Security: Experts on How to Protect Legal Clients' Confidential Data
Data security is a critical part of doing business for law firms. We asked a group of lawyers what technology and processes they have in place to protect clients' sensitive information.
At RSA, Govt. Says Attribution Key to Cyber Strategy
Despite the difficulty of attributing cyber attacks, government officials stood by attribution as a key tool in responding to cyber incidents.
Why You Shouldn’t Trust Your Lawyer with Your Most Valuable Information
As law firms continued to be targeted by cyber criminals, those firms must demonstrate to clients that their sensitive data is safe.
From the Government Accountability Office: Aviation Cyber Security Capabilities Lacking
Cyber security has become a mounting concern for the aviation industry – and rightfully so. Most recently, a study conducted by the GAO identified several critical risks in the Federal Aviation Administration’s cyber program.
Don't Fall Behind
Get the latest security insights
delivered to your inbox each week.
Thank you for subscribing!