Endpoint Security

‘Tis the Season for Predictions – Part One
Josh Mayfield
‘Tis the Season for Predictions – Part One

As people in the U.S. get ready to over-eat their Thanksgiving Day feasts, cheer on their favorite football team and hopefully look back in gratitude on all the good things 2018 has brought them, it’s my habit to also consider what the year ahead may bring. In addition to my favorite team winning the Super Bowl, I also think the security industry is in for a few changes. Here...

READ MORE
New SSD Vulnerabilities Call for Deeper Endpoint Visibility and Control
Kim Ellery
New SSD Vulnerabilities Call for Deeper Endpoint Visibility and Control

Solid-state drives (SSD) have long been great tools because they automatically encrypt data stored on them and when the device is disconnected from its host device, the data on the SSD becomes unreadable. Additionally, hardware-based encryption uses fewer systems resources than software-based encryption so they were a perfect solution for data storage, or so we thought. Earlier this month, it was reported that researchers from Netherlands’ Radboud University published...

READ MORE
Managing and Securing Data for the Remote Workforce
Kim Ellery
Managing and Securing Data for the Remote Workforce

The number of remote workers continues to climb in the U.S., according to Gallup’s State of the American Workplace Report. While a remote workforce may bring down overhead costs and even provide a boost in productivity, they also increase the chance your organization will experience a data breach. According to a 2018 study by Shred-It, 86 percent of CXOs attribute heightened breach likelihood to employees working outside of the...

READ MORE
Absolute Delivers New Workflows to Protect Against Cyber Criminals
Neeraj Annachhatre
Absolute Delivers New Workflows to Protect Against Cyber Criminals

How long has it been since you read about a breach that started with an employee unwittingly opening a malicious file in an email they thought was legitimate? It likely wasn’t long ago. Phishing is on the rise and cyber criminals use the elusive tactic to extort ransom from businesses, swipe medical data from healthcare organizations and steal money from the bank accounts of hopeful home buyers. Social engineering...

READ MORE
Lenovo and Absolute Shield Laptops, Protect Data on the Go
Mark Grace
Lenovo and Absolute Shield Laptops, Protect Data on the Go

In 2017, there was an all-time high of 1,765 data breaches with 2.6 billion records compromised. While this year isn’t quite tracking to that number so far, it’s impossible to predict what the second half of 2018 will bring. Cyberattack trends vary from one year to the next. Case in point, we haven’t seen the large-scale ransomware attacks that were so painful throughout 2017 during this calendar year. But...

READ MORE