Data Protection – Are We Focused on the Correct Areas?
How do you defend against data loss you can't see? The breaches you don't hear about? Our Wade Barisoff connects the dots between WWII airplanes and data protection to find the answer.
Friday Five 9/23
Experts are growing worried that the next cyber attack could come from an unlikely source, like an open source component or even your web browser’s spell checker. Read about this news and more in this week’s Friday Five!
Friday Five 9/9
This week saw two social media giants come under fire once again, malware that cons cybercriminals, and more cyberattacks in Ukraine. Read about these stories and more in this week's Friday Five!
What Is Enterprise File Sharing? (Is It the Same as EFSS?)
Enterprise file sharing, or enterprise file sync and sharing (EFSS), can help secure your documents and data when shared throughout your company.
What Are Types of File Sharing?
Different types of file sharing include the following:
How to Strengthen PII Security & Compliance
PII requires protection for both legal and reputational reasons, but if a data breach occurs, will your company still be able to protect this sensitive data?
What Is Considered PII?
Personally identifiable information is any information that could be used to identify a specific individual; this includes Social Security numbers, full names, and passport numbers.
Friday Five 9/2
Data privacy concerns were at the forefront of this week’s cybersecurity news but phishing and ransomware attacks are still making waves. Read about these stories and more in this week’s Friday Five!
Consumer Financial Protection Bureau Reasserts Importance of Data Protection
Organizations with poor data security could be found in violation of the Consumer Financial Protection Act's prohibition on unfair acts or practices.
Friday Five 8/26
Read about why Twitter is coming under fire, how a cybersecurity organization may have gone on the offensive, possible big changes coming for software vendors, and much more in this week’s Friday Five!
How to Form a Data Recovery Plan: Your Five Step Guide
Creating a detailed disaster recovery plan (DRP) can be a daunting and complicated task. Begin forming your plan by including the following five essential steps.
FBI Warns Proxies, Configurations Seen in More Credential Stuffing Attacks
Attackers are using proxies and configurations to mask and automate credential stuffing attacks on US companies, the FBI warns.
Don't Fall Behind
Get the latest security insights
delivered to your inbox each week.
Thank you for subscribing!