If you look around any organization, it is clear that the number of endpoints and applications in use is growing exponentially. Data is being accessed from local and cloud-based storage through mobile devices that can be used as an access point to your most sensitive information.Read More
Ryan St Hilaire was the VP of product management at Absolute, with more than 11 years of product management experience and 15 years of technology experience. St Hilaire has a Bachelor of Science, majoring in computer science, from the University of British Columbia in Vancouver, Canada.
Author: Ryan St. Hilaire
Organizations that follow data security “best practices” may think they are prepared to prevent data breaches, but in 2014 we saw over 1 billion records compromised by some of the largest – and presumably best prepared – organizations. It only takes one single device or point of entry to potentially expose millions of records. Data breaches are happening at an accelerated pace and only those organizations who adopt a holistic approach to data security, updated and adapted regularly, will stay one step ahead of cybercriminals.Read More
Insider threats are not new; 37% of organizations experienced cybercrime involving an insider in 2014. Among all incidents, insiders posed the biggest threat to the intentional theft or exposure of confidential records (76%) and consumer records (71%). Although some of these issues are associated with deliberate acts, it’s usually unintentional behaviour or negligence – disabling encryption, losing a device – that pose the greatest risk.Read More
Information Security Starts with the User. Technologies shift, enterprises react. Mobility, the...Read More