Top 5 Types of Mobile Device Breaches
Mobile devices are one of the weakest links in cyber security for businesses, yet very little is being done to mitigate the risks around these top 5 types of mobile device breaches.
Mobile devices are one of the weakest links in cyber security for businesses, yet very little is being done to mitigate the risks around these top 5 types of mobile device breaches.
Jeff Edwards | | IT Insights | Security
In this article, we'll answer some of the most common questions about the CSL, and make compliance goals as clear as possible.
Greg Mooney | | IT Insights | Security
MiFID II signifies the continuing onslaught of financial market regulations that demand transaction transparency. Such regulations burden compliance and IT teams who have to ensure their companies meet increasingly stringent security standards.
Businesses have steadily improved their perimeter security to better protect against an ever increasing number of cyber attacks. This has left hackers to look for other, less challenging paths to an enterprise’s data in 3rd party APIs.
Security breaches are occurring at an alarming rate as cybercriminals continue to successfully infiltrate the IT infrastructures of organizations across many industries.
Jeff Edwards | | IT Insights | Security
With the EU’s General Data Protection Regulation (GDPR) now in effect, GDPR preparedness should be top of mind for businesses everywhere, not just those based in the European Union (EU). This GDPR overview will take you through the basics, including the seven principles...
Jeff Edwards | | File Transfer | IT Insights | Security
Just 28% of gov.uk domains have implemented new email security standards from the Domain-based Message Authentication, Reporting and Conformance (Dmarc) protocol, according to a study from data security company Egress.
Greg Mooney | | Security
I got a chance to sit down with Kevin Conklin, the VP of Marketing at Ipswitch to talk more about the new MOVEit 2019 release and how the new MOVEit is now integrated with Mulesoft’s Anypoint Exchange.
IT keeps schooling you about the dangers of Dropbox, Google Drive, OneDrive, and other online file-sharing services. But you still need to collaborate with your colleagues as well as your customers and business partners.
Dan Franciscus | | Automation | Security
Before Windows Server 2008, Active Directory password policies were done with default domain group policy, and there could only be one policy for an entire Active Directory domain. This is very limiting if users would like to give different policies to different users,...
How is it that so many organizations focus on perimeter defense but do little to protect the target data inside that perimeter? Wouldn’t it be wonderful to protect sensitive data even if the network is breached?
Michael O'Dwyer | | Automation | Security
We all know it and are no doubt tired of hearing it, but in today’s global technological landscape, there is an ongoing and increasing danger of being hacked.
Adam Bertram | | Automation | Cloud | IT Insights | Security
When working with Microsoft Azure, you'll inevitably come to a point to where you need to access material stored locally on premise.
Greg Mooney | | Automation | Security
Automation is not always AI, but AI is an automated system. It’s easy to get the two terms confused because they both run off the same thing—data. However, the differences are far-reaching, and it’s important to know the differences between AI and Automation.
Jeff Edwards | | Security
In this episode of Defrag This, we’re taking a look back at one of the most monumental events in hacker history—the 2007 hack of TJX companies, which was, at the time, the biggest breach of consumer data in the history of the United States.
Dan Franciscus | | IT Insights | Security
Two-factor authentication is currently one of the best security practices for protecting users, data and systems. Duo is one of the leading platforms for using two-factor authentication in the enterprise as it protects many common on-premises and cloud applications by...
Greg Mooney | | Cloud | Security
Too many IT professionals believe that companies that provide cloud platforms and services, such as AWS or Google Cloud, handle all the cloud-related security. Considering how much business transpires in the cloud, this is a dangerous assumption to make.
Jeff Edwards | | Security
Today, the world's largest hotel chain, Marriott International, disclosed what may be turn out to be one of the largest data breaches in history.
Greg Mooney | | Security
It’s the proverbial 1,000-pound gorilla—a compliance violation. Perhaps you haven’t seen one yet, but you know it’s out there lurking, and it just might come banging on your door any day now.
Jeff Edwards | | Security
If 2017 was the year of the ransomware attack, then 2018, insofar as it can be defined by malware, was the year of cryptojacking.
Let's stay in touch! Register to receive our blog updates.
Let's stay in touch! Register to receive our blog updates.