7 Tips to Stop Falling for Phishing Attacks
Follow these helpful tips to get better at recognizing and avoiding phishing attacks.
Law Firms: Cyber Criminals’ Next Top Target?
Without breach notification requirements in place, it can be hard to gauge the popularity of law firms as targets for cyber criminals. But if recent findings are any indication, the legal industry may well be the next lowest hanging fruit for attackers.
Wanted: Clean Bills on Data Breach and Cyber Intel Sharing
The answer to getting critical federal legislation governing data breach disclosure and cyber threat information sharing is clear – once Congress takes politics out of the equation.
7 Ways to Lose Sensitive Data
With trends like BYOD, workforce mobility, and the adoption of cloud and web applications for business, there are more opportunities for sensitive data loss than ever before. Here are our top 7 ways that sensitive data is most commonly lost as well as tips for preventing data loss.
A Day in a Life: Sensitive Data Protection
Check out this slideshow to learn about some of the risks your sensitive data faces in a typical business day.
What is PCI Compliance? 12 Requirements & More
Learn about The Payment Card Industry Data Security Standard requirements and the independent body, PCI Security Standards Council, that manages and enforces the PCI DSS.
Why Managed Security Services?
Managed security services are becoming an increasingly popular option for increasing the value brought by security solutions while reducing IT complexity.
Sell By Date: Research Finds Stolen Data is a Perishable Commodity
New research to develop a computer based model of cyber crime finds that time is the critical element assessing the cost of cyber incidents.
Podec Trojan Marks Spike in Malware Distribution via Mobile Apps, Social Media
The unveiling of the Podec Trojan by Kaspersky once again demonstrates the risks involved with downloading mobile applications from untrusted or unofficial app stores.
Data Security Experts Answer: What is the Biggest Misconception Companies Have About Endpoint Security & Protection Tools?
27 data security experts dispel some of the biggest myths about endpoint security solutions.
Don't Fall Behind
Get the latest security insights
delivered to your inbox each week.
Thank you for subscribing!