Data Visibility & Protection

The Criticality of Strong Cyber Hygiene
Josh Mayfield
The Criticality of Strong Cyber Hygiene

The more connected we become, the more at risk we are to cyber criminals who are busy looking for a chance to capitalize on our technology dependency. Unfortunately, we’ve seen this breakdown many times – in our hospitals when WannaCry ransomware forced medical personnel to turn away patients and in our local governments when ransomware used by the SamSam group rendered the city of Atlanta incapable of validating arrest...

READ MORE
New SSD Vulnerabilities Call for Deeper Endpoint Visibility and Control
Kim Ellery
New SSD Vulnerabilities Call for Deeper Endpoint Visibility and Control

Solid-state drives (SSD) have long been great tools because they automatically encrypt data stored on them and when the device is disconnected from its host device, the data on the SSD becomes unreadable. Additionally, hardware-based encryption uses fewer systems resources than software-based encryption so they were a perfect solution for data storage, or so we thought. Earlier this month, it was reported that researchers from Netherlands’ Radboud University published...

READ MORE
How to Track Your Devices, Apps & Data in 3 Steps
Josh Mayfield
How to Track Your Devices, Apps & Data in 3 Steps

Remember when your devices were relatively few, static and accessed data on the network only through a firewall? Barely, right? Those good old days are forever gone as the number of corporate endpoints have multiplied, are sourced from several manufacturers and come with different operating systems. Not to mention users now also access corporate networks from their own devices through applications that are too numerous to count. Likewise, security...

READ MORE
Managing and Securing Data for the Remote Workforce
Kim Ellery
Managing and Securing Data for the Remote Workforce

The number of remote workers continues to climb in the U.S., according to Gallup’s State of the American Workplace Report. While a remote workforce may bring down overhead costs and even provide a boost in productivity, they also increase the chance your organization will experience a data breach. According to a 2018 study by Shred-It, 86 percent of CXOs attribute heightened breach likelihood to employees working outside of the...

READ MORE
How the Cook County Sheriff Lights Up Dark Endpoints
Juanma Rodriguez
How the Cook County Sheriff Lights Up Dark Endpoints

Every business is a data business, and law enforcement is no exception. Law enforcement organizations hold confidential information that cyber criminals consider valuable. Attack methods and goals vary of course, from hackers breaking in via a supplier to swipe personnel data, as was the case in one incident that targeted U.S. law enforcement agencies earlier this year, to hacking police bodycams to alter footage. More common – and equally...

READ MORE