What is the goal when a breach report is investigated by the Office for Civil Rights? Jocelyn Samuels, Director of the HHS Office for Civil Rights (OCR), has said that the intent is not limited to identifying the cause of the breach.
Given the amount of corporate data stored in the cloud, public cloud apps have become a top Shadow IT risk for businesses. How have cloud storage apps become so popular in the enterprise?
The role of Chief Information Officers (CIOs) at the state level of government is changing. As the responsibility of IT purchasing shifts to business units and end users, CIOs are having to juggle new technology demands, opportunities and risks.
NIST has released a draft report and guide on the security vulnerabilities associated with endpoint devices. Along with this guide, NIST has opened its draft mobile security threats catalogue for public comment.
Companies are haemorrhaging data from the endpoint, and there is no single, clear cause behind this steady flow. According to a new survey by NetEnrich, Corporate IT Hounded by Mobile Security Concerns, 42% of IT pros said their organizations suffered key corporate data loss from a mobile device.
The data on employee endpoints—like laptops, mobile phones, and tablets—is at risk. While theft due to malware is a perennial risk, endpoint data is also at risk of theft through email, cloud storage, and device theft.
The recent data breach disclosed by Yahoo is set to be a game changing event. Already, the breach has had immediate repercussions both for Yahoo, potentially putting its Verizon acquisition at risk, and for other organizations.
Absolute MTM for Chromebooks Web Filtering lets you to re-allocate your time and effort. Find out what you can expect from Absolute MTM for Chromebooks Web Filtering.