Blog Posts Tagged with "Data Protection"

D36d0936f0c839be7bf2b20d59eaa76d

Why the GDPR is Important to Your Organization

August 14, 2017 Added by:Steve Durbin

The GDPR is the biggest shake-up of global privacy law in decades as it redefines the scope of EU data protection legislation.

Comments  (0)

02fe982eecea0dda30ffa3657a08097b

How to Choose the Right Data Protection Strategy

August 02, 2017 Added by:Dave Packer

A deep dive on data protection solutions and how they fit unique needs.

Comments  (0)

608fdf3ab6d2bd77e08ec9c2774d03d9

Are Job Seekers at Risk of a Cyber Breach?

April 07, 2017 Added by:Amir Geri

Job seekers are regularly expected to input personal information about themselves to company and state databases, but it should be guaranteed that their information will remain secure.

Comments  (0)

Fa053a3185c9b7154992fb4bffe11e76

FriendFinder Breach Highlights the Need for Better Practice in Password Security

January 31, 2017 Added by:Donato Capitella

The FriendFinder Network breach is a perfect example of how poor password storage can exacerbate the impact of a breach and expose accounts to further exploitation.

Comments  (0)

8abfe8ac9ec214d68541fcb888c0b4c3

Norton Cyber Security Insights Report - November 2016

November 17, 2016 Added by:Peter Buttler

A new survey conducted by Symantec found that consumers are overwhelmed with the concern to protect their devices from cybercriminals.

Comments  (0)

B261bfcc99f93249e275ddd135ffec57

Avoiding Ransomware with Strong Endpoint Security

May 26, 2016 Added by:Dean Dyche

Ransomware attacks are growing in volume and sophistication. To best defend against ransomware, users must ensure that their machines remain up to date with the latest patches and security updates.

Comments  (0)

179bc88eff504b5632ac8fbd9ee7b09d

Six Things to Know About Computer Theft

March 15, 2016 Added by:Eyal Bek

Besides the usual precautions, encryption can put a huge dent in the problem by making stored information unintelligible to intruders. Self-encrypting drives further help by minimizing the performance impact by offloading encryption to specialized hardware and taking humans out of the picture.

Comments  (0)

69fd9498e442aafd4eb04dfdfdf245c6

Managing My Company’s Security is a Nightmare

May 17, 2013 Added by:Luis Corrons

IT Departments are very often one step behind users, and unfortunately in most cases there is no real control over all devices on the corporate network. Despite perimeter solutions still being a necessity, the corporate perimeter must now expand to include new devices (mainly smartphones and tablets) that also handle confidential corporate information.

Comments  (0)

65c1700fde3e9a94cc060a7e3777287c

Protect Data Not Devices?

April 05, 2013 Added by:Simon Moffatt

As the devices becomes smarter, greater emphasis is placed on the data and services those devices access. Smartphones today come with a healthy array of encryption features, remote backup, remote data syncing for things like contacts, pictures and music, as well device syncing software like Dropbox. How much data is actually specifically related to the device?

Comments  (0)

4c1c5119b03285e3f64bd83a8f9dfeec

Keeping Safe In The Cloud

September 09, 2012 Added by:Ben Kepes

“With the cloud, you don’t own anything. You already signed it away through the legalistic terms of service with a cloud provider that computer users must agree to... the more we transfer everything onto the web, onto the cloud, the less we’re going to have control over it...”

Comments  (0)

F29746c6cb299c1755e4087e6126a816

Losing Trust: Canadian Data Breach Spotlights Human Error

July 27, 2012 Added by:Kelly Colgan

It’s not just about protecting ourselves from identity theft or fraud like when our account number or government-issued ID numbers are exposed. It’s what I like to call privacy for the sake of privacy. Just knowing that someone could be looking at our personal histories doesn’t sit well with the public...

Comments  (0)

94c7ac665bbf77879483b04272744424

BYOD is a Bunch of FUD

July 16, 2012 Added by:Marc Quibell

Times have changed , and I'm not talking about the technologies involved. I'm talking about the rules and regulations we have to follow, and the best practices we as employees must abide by - as opposed to the days of the old briefcase - when it comes to protecting the data with which we are entrusted...

Comments  (2)

Fc152e73692bc3c934d248f639d9e963

Call Centers and PCI Compliance

June 28, 2012 Added by:PCI Guru

In a call center environment where operators are taking orders over the phone and accepting credit/debit cards for payment, until the card transaction is either approved or declined, we are talking pre-authorization data. Only cardholder data after authorization or decline is covered by the PCI DSS...

Comments  (2)

37d5f81e2277051bc17116221040d51c

How Do I Protect Myself When Using Wi-Fi?

June 28, 2012 Added by:Robert Siciliano

Today, with criminal hackers as sophisticated as ever, if you are using an open unsecured network on your mobile device, you risk exposing your data. There are many ways for hackers to see who’s connected on a wireless connection, and to gain access to your information...

Comments  (0)

3e35900ae6facc6c146a85c435c71d82

Security and Privacy for Microsoft Office 2010 Users

June 27, 2012 Added by:Ben Rothke

Encryption, privacy, data protection, and macro security are but a few of the vital capabilities for anyone using Microsoft Office - or any office suite for that matter. Author Mitch Tulloch shows how to take control of the Microsoft Office 2010 experience and use the many security and privacy features...

Comments  (0)

A7290c5bd7bc2aaa7ea2b6c957ef639b

Legal Implications of BYOD Part II: Preparing Use Policies

June 26, 2012 Added by:David Navetta

Unfortunately, implementing a BYOD strategy and developing personal device use policies is not a one-size-fits-all cookie cutter exercise. In most cases significant privacy, security and legal challenges exist, and those challenges will vary depending on a multitude of factors that are specific to the organization...

Comments  (0)

Page « < 1 - 2 - 3 - 4 > »