Organizations Mistakenly Believe Their Endpoints Are Secure

Organizations Mistakenly Believe Their Endpoints Are Secure

In 2015, we saw more data breaches and larger data breaches than ever before with almost half of all organizations suffering at least one serious security incident / data breach in the past 12 months. IDC predicts that by 2020, more than 1.5 billion people, or a quarter of the world’s population, will be affected by data breaches. Given this state of affairs, one would assume that organizations would be wary to call themselves prepared.

In-House Counsel Note Organizations Unprepared to Deal With Human Error

In-House Counsel Note Organizations Unprepared to Deal With Human Error

The Association of Corporate Counsel (ACC) recently released its State of Cybersecurity Report giving a legal insider perspective to the current cybersecurity practices, prevention, protection and response standings at more than 800 organizations across 30 countries.

Cybersecurity Controls Remain a Priority in Financial Services for 2016

Cybersecurity Controls Remain a Priority in Financial Services for 2016

Financial services organizations have been facing an increased level of scrutiny in regards to data security. In 2015, both the Securities and Exchange Commission (SEC) and the Financial Industry Regulatory Authority (FINRA) announced a stronger commitment to data protection, including tighter regulations and enforcements, putting added pressure on financial institutions to prove that policies, procedures and technologies are in place to protect data and respond to breaches, should they occur. Both organizations have recently announced this commitment to data protection remains strong.

BYOD in K-12 Education Comes With Challenges

BYOD in K-12 Education Comes With Challenges

It was estimated that 20% of K-12 classrooms would have integrated BYOD programs by the end of 2015, with the promise of being able to deliver on digital curriculum without the capital expense of 1:1 programs. Unfortunately, BYOD has come with more challenges to the K-12 classroom than anticipated.

What Does the Cybersecurity Act of 2015 Mean for You?

What Does the Cybersecurity Act of 2015 Mean for You?

After several years of discussion, the Cybersecurity Act of 2015 was signed into law as part of the 2016 omnibus spending bill. The Cybersecurity Act of 2015 encourages sharing of cyber threat information between private businesses and the federal government. In addition to the sharing of threat information, the Act will require the federal government to release periodic cybersecurity best practices.

Millennials Likely to Evade Restrictive Workplace Security Controls

Millennials Likely to Evade Restrictive Workplace Security Controls

Millennials, adults now aged 18-34, are the single largest generation in the US workforce, a generation which will account for 75% of the workforce within 10 years. As the first generation of Digital Natives, Millennials have different expectations when it comes to work. One of those expectations relates to the shifting use of endpoint devices, with the mobile phone now outweighing the laptop as the preferred device for going online.

Absolute at RSA Conference 2016

Absolute at RSA Conference 2016

IT Security professionals from around the country will be gathering in San Francisco for RSA Conference 2016 in February. The Absolute team will also be in attendance to showcase the capabilities of Absolute DDS and our Persistence technology.

Why You Should Be Prioritizing Breach Detection

Why You Should Be Prioritizing Breach Detection

We know that 90% of organizations will suffer at least one security incident this year: no organization is immune. With the number of data breaches consistently on the rise, and the breadth and cost of those breaches rising as well, there is no question that data breach prevention is key for every organization. While it’s important to prevent and mitigate the damage from breaches, it’s just as vital to know that they have happened at all.