Cybersecurity Controls Remain a Priority in Financial Services for 2016

Cybersecurity Controls Remain a Priority in Financial Services for 2016

Financial services organizations have been facing an increased level of scrutiny in regards to data security. In 2015, both the Securities and Exchange Commission (SEC) and the Financial Industry Regulatory Authority (FINRA) announced a stronger commitment to data protection, including tighter regulations and enforcements, putting added pressure on financial institutions to prove that policies, procedures and technologies are in place to protect data and respond to breaches, should they occur. Both organizations have recently announced this commitment to data protection remains strong.

BYOD in K-12 Education Comes With Challenges

BYOD in K-12 Education Comes With Challenges

It was estimated that 20% of K-12 classrooms would have integrated BYOD programs by the end of 2015, with the promise of being able to deliver on digital curriculum without the capital expense of 1:1 programs. Unfortunately, BYOD has come with more challenges to the K-12 classroom than anticipated.

What Does the Cybersecurity Act of 2015 Mean for You?

What Does the Cybersecurity Act of 2015 Mean for You?

After several years of discussion, the Cybersecurity Act of 2015 was signed into law as part of the 2016 omnibus spending bill. The Cybersecurity Act of 2015 encourages sharing of cyber threat information between private businesses and the federal government. In addition to the sharing of threat information, the Act will require the federal government to release periodic cybersecurity best practices.

Millennials Likely to Evade Restrictive Workplace Security Controls

Millennials Likely to Evade Restrictive Workplace Security Controls

Millennials, adults now aged 18-34, are the single largest generation in the US workforce, a generation which will account for 75% of the workforce within 10 years. As the first generation of Digital Natives, Millennials have different expectations when it comes to work. One of those expectations relates to the shifting use of endpoint devices, with the mobile phone now outweighing the laptop as the preferred device for going online.

Absolute at RSA Conference 2016

Absolute at RSA Conference 2016

IT Security professionals from around the country will be gathering in San Francisco for RSA Conference 2016 in February. The Absolute team will also be in attendance to showcase the capabilities of Absolute DDS and our Persistence technology.

Why You Should Be Prioritizing Breach Detection

Why You Should Be Prioritizing Breach Detection

We know that 90% of organizations will suffer at least one security incident this year: no organization is immune. With the number of data breaches consistently on the rise, and the breadth and cost of those breaches rising as well, there is no question that data breach prevention is key for every organization. While it’s important to prevent and mitigate the damage from breaches, it’s just as vital to know that they have happened at all.

The Rise of the Mobile Workforce Presents Data Security Challenges

The Rise of the Mobile Workforce Presents Data Security Challenges

The composition of the workforce is changing. IDC predicts that the U.S. mobile worker population will account for nearly 72% of the total US workforce by 2020. The changing demographic in the workforce, combined with mobility and the rise in 24/7 working, has caused many organizations to adopt flexible work policies, with employees telecommuting all or part of the time, and increasing the use of contractors as an alternative to employees. Ardent Partners estimates that 45% of the workforce will be “contingent”—self-employed, contractors and temps—by 2017.

MT Højgaard Verifies SCCM Health With Absolute DDS

MT Højgaard Verifies SCCM Health With Absolute DDS

As one of the leading construction and civil engineering companies in the Nordic countries, MT Højgaard struggled to identify users and validate that software was properly installed and working. More importantly, devices were often left in places like cars while on-site or in transit, leaving them open to theft.