2017 Will be a Regulatory Wake-Up Call

2017 Will be a Regulatory Wake-Up Call

There have been many predictions for 2017 which have touched on the impact that the EU GDPR will have on organizations around the globe, but the truth is that the GDPR is not the only change on the horizon. Federal, state, and industry regulators have all made moves […]

Predictions for Corporate Data in 2017: The Endpoint is Everywhere

Predictions for Corporate Data in 2017: The Endpoint is Everywhere

As 2016 nears the end, it would be satisfying to gaze back on all the successes that organizations have had in combatting the rising tide of data risks. Sadly, that tide keeps on rising. Data breaches in 2016 are already up 31% over 2015 figures, breaching over 35 […]

People Continue to Remain Top Cyberthreat

People Continue to Remain Top Cyberthreat

Echoing the findings from the past year, and despite growing media frenzies over cyberattacks and malware, people continue to remain the top cyberthreat to businesses in North America. In North America, the most serious data breaches were attributed to careless / uninformed employee actions in 59% of cases […]

Modern Embedded Endpoint Security with Absolute DDS: IDC Technology Spotlight

Modern Embedded Endpoint Security with Absolute DDS: IDC Technology Spotlight

Enterprise IT teams face an uphill struggle to maintain visibility into and control over corporate resources and to mitigate risks to critical business assets. The ever-growing distributed nature of corporate networks, brought about by Cloud adoption and the proliferation of mobile devices, has increased the complexity over IT […]

Visibility Key to Thwarting Changing Threat Profile

Visibility Key to Thwarting Changing Threat Profile

Right now, we are on the cusp of major change – the expansion of mobile device options, BYOD, the cloud, and the decentralization of IT. Many of these changes are only in their infancy in terms of their current impact on the corporation. In four years time, the […]

Invest in your Security Culture

Invest in your Security Culture

Although the risk landscape facing organizations is always changing, the insider threat consistently remains the top source of data breaches. The insider threat is there to amplify any threat: cyberattacks, BYOD, cloud, IoT. Every new threat is made worse by people. So, how do you address the Insider […]

Your BYOD Devices are Your Biggest Vulnerability

Your BYOD Devices are Your Biggest Vulnerability

Mobile devices are the greatest cyber vulnerability for organizations, suggests a new report. Based on the data on its 10 million mobile device subscriber base and the Zimperium Global Threat Intelligence Lab, the report indicates that 60% of mobile devices in enterprise BYOD environments are vulnerable to known […]

SMBs Putting Data at Risk in Free Cloud Storage

SMBs Putting Data at Risk in Free Cloud Storage

Small- to medium-sized businesses (SMBs), organizations with 50 to 500 employees, currently rank security as their top priority when shopping for a cloud storage provider and yet a whopping quarter of SMBs still only use a free version of cloud storage – likely the least secure option. More […]