How to Identify Data at Risk on Your Endpoints

How to Identify Data at Risk on Your Endpoints

With more oversight, you can not only minimize your data at risk and the costs associated with a data breach, but potentially eliminate it.

The Download: This Week’s Top Security News

The Download: This Week’s Top Security News

This week we cover cyberattack trends in the energy and transport sectors, the IRS E-file web app, and a CCTV botnet.

How an Incident Response Team Can Save Your Company

How an Incident Response Team Can Save Your Company

Incident response planning can play a large part in reducing the scope and costs associated with a security incident.

Data Breach Costs Rise to $4 Million Per Incident

Data Breach Costs Rise to $4 Million Per Incident

The average cost of a data breach continues to rise, up to $4 million per incident, over 2015 figures of $3.79 million. Since 2013, there has been a 29% increase in the average cost of data breaches.

How Sacred Heart Overcame Their Biggest Security Challenge

How Sacred Heart Overcame Their Biggest Security Challenge

With the move towards portable devices, Sacred Heart needed to ensure the hardware, and the sensitive data stored on these devices, remained protected, regardless of the device location or user.

Education Sector Hit Hard by Insider Threats in 2016

Education Sector Hit Hard by Insider Threats in 2016

The total number of breaches recorded by the 2016 ITRC Breach Report hit 489 last week, an increase of 19.8% over last year’s figures. Year-over-year, breaches in the Education sector are up 70 percent over 2015 figures.

The Download: This Week’s Top Security News

The Download: This Week’s Top Security News

This week we cover the University of Greenwich breach, new ransomware RAA, and the DoD bug bounty pilot program.

Hackers are Not the Biggest Threat to your Company’s Data

Hackers are Not the Biggest Threat to your Company’s Data

The biggest gaps in current endpoint security models exist in mobile devices, the Insider Threat and the unsanctioned use of third-party Cloud applications.