IT is becoming increasingly decentralized, with purchasing and management decisions being made at the business level. As cloud computing continues to move technology beyond IT, data is increasingly at risk. According to a new study by VMware, 69% of respondents believe IT has become increasingly decentralized over the […]
Cloud technology is revolutionizing businesses the world over, extending the capabilities of employees to work and collaborate anytime, anywhere on any device. However, what we are seeing right now is that many uses of the Cloud are disorganized, with most Cloud purchasing being organized at the business unit […]
The Chinese government has just passed a cybersecurity law that has broad implications for international businesses. The move comes with great criticism, with some calling the law “draconian” and “abusive” while others note the law is “vague” enough to spark worries of “censorship and espionage.” The legislation was […]
We’ve posted many times about the importance of having a data breach response plan in place. Indeed, the FTC just released its own guidance on data breach response. A new study, however, demonstrates that “having a response plan is simply not the same as being prepared,” particularly if […]
Cybersecurity threats are evolving. Cybersecurity spending is increasing. But are the current investments in prevention actually helping? These are questions that PwC has been asking in some of their latest research.
The UK Information Commissioner’s Office just issued a record fine to UK telecom company TalkTalk in connection with an October 2015 data breach.
Companies are haemorrhaging data from the endpoint, and there is no single, clear cause behind this steady flow. According to a new survey by NetEnrich, Corporate IT Hounded by Mobile Security Concerns, 42% of IT pros said their organizations suffered key corporate data loss from a mobile device.
The data on employee endpoints—like laptops, mobile phones, and tablets—is at risk. While theft due to malware is a perennial risk, endpoint data is also at risk of theft through email, cloud storage, and device theft.