IT managers must know what types of data cybercriminals covet to close any security loopholes that might lead to a security breach.
Outgoing employees are motivated by revenge, greed and resentment to abscond with valuable data. A robust exit process is the key to preventing IP theft.
Co-working spaces can help companies maximize productivity, but they can also introduce security concerns if employees are not trained to connect securely.
All access is not created equal. To protect your crown jewels from an insider threat, it's critical to know your data and, more importantly, your users.
Companies around the world must review the processes by which they collect and store personal data to prepare for the upcoming GDPR compliance regulations.
Automation and analytics can help IT professionals speed up and solidify their data protection programs and prepare for regulatory audits.
A recent Dailymotion hack means the account details and email addresses of 85 million users have potentially been compromised.
The list of notable 2016 data breaches is long and wacky. Cybercriminals compromised food delivery apps, FBI databases and seemingly everything in between.
To protect their organizations from an insider threat, IT managers should take steps to reduce exposure of data and enhance detection capabilities.
Organizations that fall for hollow sales pitches for imperfect data security solutions risk leaving their valuable assets vulnerable to cybertheft.