Endpoint Security

Will 2019 Be the Year of GDPR Fines?
Neeraj Annachhatre
Will 2019 Be the Year of GDPR Fines?

Is 2019 the year we will feel the full impact of GDPR? Chances are good the answer to that question is a resounding “yes!” GDPR went into effect May 25, 2018 and, as of yet, no sizable fines have been levied for data privacy missteps in the protection of personally identifiable information (PII) of EU citizens. Despite light action in actual enforcement to date, there is plenty of evidence...

READ MORE
Absolute Named the Leader in the G2 Crowd Grid® Report for Endpoint Management Winter 2019
Juanma Rodriguez
Absolute Named the Leader in the G2 Crowd Grid® Report for Endpoint Management Winter 2019

At Absolute, we’re passionate about our customers. We work hard to provide uncompromised visibility and near real-time remediation of security breaches at the endpoint. It’s rewarding to know our customers are equally as excited about us. Absolute is happy to share that it has been recognized as the Leader in the G2 Crowd Grid® 2019 Report for Endpoint Management. G2 Crowd is the world’s leading business solutions review website...

READ MORE
3 Things Not To Do After a Data Breach
Josh Mayfield
3 Things Not To Do After a Data Breach

As if a data breach isn’t problem enough, mishandling of a security incident makes an already bad situation worse. Just ask Equifax whose executives were charged with insider trading by U.S. officials after the company’s 2018 data breach or Marriott who is now facing multiple class-action lawsuits for, in part, failing to provide an adequate, timely notification. If you’re facing a data breach at your organization, here are three...

READ MORE
Back to the Basics for Data Breach Prevention
Mitch Kelsey
Back to the Basics for Data Breach Prevention

According to the Identity Theft Resource Center (ITRC), the number of significant data breaches at businesses, government agencies, and other organizations in the U.S. alone hit a new high of 1,579 in 2017. That number is much higher for 2018 says the ITRC, even though final numbers are not yet available. Both years are up substantially from fewer than just 200 in 2005, the year the non-profit started tracking...

READ MORE
Cybersecurity Threats Part 2: Cybersecurity Checklist
Kim Ellery
Cybersecurity Threats Part 2: Cybersecurity Checklist

In our second part of a two part series on cyber threats, we look at how opportunistic cyber criminals are and ways you can protect your organization (and your data). It’s pretty clear that cyber criminals are employing a wide variety of tactics to breach your organization for financial gain. Their efforts result in significant costs for those on the receiving end. The Center for Strategic and International Studies,...

READ MORE