Absolute DDS Complements and Strengthens SCCM

Absolute DDS Complements and Strengthens SCCM

At Absolute, we are always listening to our customers and gathering feedback on the challenges they face within their IT environments. Many of our customers have reported that Microsoft SCCM is an important component within their IT security and management stack.

Six Steps to Effective Healthcare Data Breach Response

Six Steps to Effective Healthcare Data Breach Response

Healthcare IT is undergoing a complex and challenging transformation. Today healthcare IT departments must not only keep up with ever-changing regional and global regulations surrounding protected health information (PHI), they also have to stay one step ahead of cybercriminals and situations that could lead to data breaches—even if they’re accidental.

How to Prevent Healthcare Data Breaches

How to Prevent Healthcare Data Breaches

Today’s healthcare organizations are under pressure to increase the affordability, quality and efficiency of patient care, all while streamlining costs and staying compliant with ever-changing regulatory legislation. Those demands alone are enough to strain resources to the breaking point. However, recent studies show that protecting patient information is one of the biggest challenges that modern health practices face.

Absolute Joins the RSA Ready Technology Partnership Program

Absolute Joins the RSA Ready Technology Partnership Program

Absolute announced today a new collaboration with RSA to offer enhanced endpoint data collection and remediation. As part of the RSA Ready Technology Partnership program, this effort is designed to deliver seamless interoperability between Absolute and RSA Security Analytics, an industry leading advanced threat detection and forensics platform.

Half of the Worst Data Breaches Caused by People

Half of the Worst Data Breaches Caused by People

PwC recently conducted a survey of organizations in the UK about cyber security incidents. In the 2015 Information Security Breaches Survey, commissioned by the Department for Business, Innovation and Skills (BIS), it’s clear that security breaches continue to rise and also that the average cost per breach is rising even more quickly.

Insiders as a Growing Threat

Insiders as a Growing Threat

According to the 2015 Cyber Security Intelligence Index compiled by IBM, there are more successful cybersecurity incidents than ever before. Between 2013 and 2014, the number of security events dropped by 36%, but the number of resultant security incidents remained static, showing a greater success rate. Even more troubling, more “bad guys” are insiders than ever before.

Top 6 Security Considerations in Migrating to Microsoft Windows 10

Top 6 Security Considerations in Migrating to Microsoft Windows 10

The release of a new Microsoft operating system is always an important event for IT departments, and Windows 10 is no exception. While there are many new features to look forward to, the adoption of a new operating system can also be a period of increased security vulnerability – particularly if the IT department doesn’t have the tools, technologies and processes to have comprehensive visibility and control over their endpoints. For IT, one of the top priorities must be ensuring that existing devices are secure and remain secure during and after the transition from one OS version to another.

Data Breach Response: The First 24 Hours Post-Discovery

Data Breach Response: The First 24 Hours Post-Discovery

There is a direct correlation between how quickly an organization can identify and contain a data breach and the financial consequences that may result. Is your organization prepared to act quickly to mitigate the damage and to meet compliance regulations?