Insiders as a Growing Threat

Insiders as a Growing Threat

According to the 2015 Cyber Security Intelligence Index compiled by IBM, there are more successful cybersecurity incidents than ever before. Between 2013 and 2014, the number of security events dropped by 36%, but the number of resultant security incidents remained static, showing a greater success rate. Even more troubling, more “bad guys” are insiders than ever before.

Top 6 Security Considerations in Migrating to Microsoft Windows 10

Top 6 Security Considerations in Migrating to Microsoft Windows 10

The release of a new Microsoft operating system is always an important event for IT departments, and Windows 10 is no exception. While there are many new features to look forward to, the adoption of a new operating system can also be a period of increased security vulnerability – particularly if the IT department doesn’t have the tools, technologies and processes to have comprehensive visibility and control over their endpoints. For IT, one of the top priorities must be ensuring that existing devices are secure and remain secure during and after the transition from one OS version to another.

Data Breach Response: The First 24 Hours Post-Discovery

Data Breach Response: The First 24 Hours Post-Discovery

There is a direct correlation between how quickly an organization can identify and contain a data breach and the financial consequences that may result. Is your organization prepared to act quickly to mitigate the damage and to meet compliance regulations?

Data is At Risk: Use the Absolute Wake Up Call to Get Alerts

An Absolute wake up call is when you find out terabytes of corporate data are at risk. Or that over 10% of your devices are missing. Our customers get Absolute wake up calls every day. They love them because instead of waiting for disaster to strike, they can take control and avoid a data breach or other security incident altogether.

Neglect Leaves Enterprises Open to Old Vulnerabilities

Neglect Leaves Enterprises Open to Old Vulnerabilities

All nine of the most dangerous enterprise vulnerabilities detected in the wild are more than three years old. This means that most enterprise vulnerabilities are not new or cutting edge, putting to rest many enterprise fears about “keeping up” with evolving data security risks. It’s clear from the data, it’s just as important to clean house and address existing vulnerabilities.

Absolute Extends Security Reporting to Microsoft SCCM with SIEM Integration

Absolute Extends Security Reporting to Microsoft SCCM with SIEM Integration

Absolute today announced new security functionality to the Absolute DDS (formerly Absolute Computrace) Customer Centre. In our latest update, we extend IT oversight to include the status of Microsoft System Center Configuration Manager (SCCM) on each device as well as the integration of Absolute alerts with Security Information and Event Management (SIEM) solutions.

Making Cybersecurity and Data Security a Business Issue

Making Cybersecurity and Data Security a Business Issue

GRC (Governance, Risk Management and Compliance) is currently one of the biggest issues facing companies of all sizes. To date, GRC has not always found billing in boardrooms across the country, but the fallout of major data breaches in the past two years has sent a clear message: the responsibility for data breaches is being laid on the board of directors and C-level employees.

Are Security Priorities Addressing the Top Risks?

Are Security Priorities Addressing the Top Risks?

In order to address the question of whether or not Security Spending was actually addressing Security Threats, the Gartner Group surveyed security professionals at the Black Hat Conference. After all, organizations are working hard to combat security threats, yet data breaches continue to rise. Why is that? According to […]